Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

Appln. No. 

09/870.801 


Appltcani 

Karl L. Ginter, et al. 





Filing Dale 

June 01. 2001 


[Group: 

2132 




Examiner 

Initial 

Document 
Number 

Issue Date 

Name 

Class 

Sub 
Class 

Hling Date 
If Appropriate 

A A 

IP . 

'573 747 /} 

04/06/71 

Adams, et al. 




-M. 

o Ton 7nn ^ 
o,/yu,/uu ^ 


Callais et al 

(n 9 
I / (J 


fi Id/ 1^11 

-# — - 

0,DUO»0 f 

04/21/74 

Ehrat 



d'i^llil/ (Hi 

—1^ — — 



Crosby 


\fl r 

ni / / c / /ol/ 
^ ' 1 /A 1 (/ n 






^ f 1 

i}Ll Lr * // i\ 



3,956,449 /I 





U 0 t 1 I f 

0 . — 

4,020,3jfD ff 






— 

A ^f\A 70^ /% 

4,104,^^1 f\ 


Markstein et al 





A ACtO Afi'X . 

4,10Z,4oo 

07/94/79 

^ntenman 
lid fi* ■ 



n^oi 1 /911 . 

U y[ Ml i 1,1 ! 1 

— ^ 

— ^ 

4, IOO,UOO ^ 

01/08/80 

Robefts et al. 






01/20/81 

Thomas 



^/t' ^ I L 7 i 

— ,^ ■ ■ 

4^59 720 /J 

03/31/81 

Campbell 

4 « r 



— ^ 

4-278 837 A 

07/14/81 

Best 



V -w ^ \^ 1 - ^ III 

— ^ 

02. 

4 321.672 A 

03/23/82 

Braun et al. 



ll/U/ 


4,405,829 A 

09/20/83 

Rivest et al. 




^ 

4,442,484/5- 

04/10/84 

Childs, Jretal. 




^ 

02. 

4,471,216^0 

09/11/84 

Herve 





4.523.271/1 

06/11/85 

Levien 




^ 

a/} 

4.525.599 4 

06/25/85 

Curran et al. 

nP 



^ 

^ 

4.529.870 ^ 

07/16/85 

Chaum 


if 0 




4.562.305 (j 

12/31/85 

Gaffhey. Jr. 




: — ^ — 

4.573.119^ 

02/25/86 

Westheimer et al. 

ICY • 


oil li 1/1^1 


4.578.530^ 

03/25/86 

Zeidler 



(viol/ (9 PI 

— 

4.584.639^ 

04/22/86 

Hardy 





4.590,552 

05/20/86 

Guttag et al. 


2^0 • 



4.593.183 ^ 

05/03/86 

FuKatsu 




— ■- 

4.598.288/} . 

07/01/86 

Yarbrough et at. 




0 

4.599.489 

07/08/86 

Cargile 

n7 i 




Page 1 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451. OOOM8000 

Appln. No. 

09/870,801 


Applicant 

Kart L. Gtnter. et al. 





Filing Date 

June 01.2001 


- Group: 

2132 





Examiner 
inniai 

Document 

Issue Date 

Name 

Class 

Sub 
Class 

Rling Date 
If Appropriate 

—M- 


00/02/86 

Caralle 






nQyn2Mfi 

Dozier 

^ 0 r 

"La 


— 4- 


li/n^/AA 
1 l/U*f/Ov 



/ ^1 l1 


f ■ ■ 

4,621 ,oo4 4 

11/U4/0O 


? U \/ 





4,622,222 ^ 

n/i 1/oD 

nm voii 1 CI ai- 

V7 L/ 



— # — - 

4,672,605 ^ 

UO/Uo/O / 

nuouy CI at* 

T /I 

i7 0 

/ o 




4,677,552 ^ 


Qihkk\# Ir 






4.683,968 (\ 


AnnolKatim c^l ill 
fifjyftjtuoKMf I d ai. 

1 Pi) 

a 

T 




—0. 

4,700,296 ^ 

•in/i ^/fl7 

Palmer tr ofr £il 

J V) r 

TO/ 



4,7Zr,OOU y] 

U^^Or OO 

tot 1^ w% «■* 

7 


/SO 1 /Q / f OiOr- 




10/25/88 

Crosslev 

j pj r 


fsnh 9/ i 9Pl 
0 H 1 1 '(r 6 


A 70R ^0 >f 

01/03/89 

Wolfe 

J c r 


l^/l K / / ^ V P 

— # ■ 




01/27/89 

Ktingenbeck, et al. 

llJ 


^11 y§( //' / 



4 816 655 A 

Jl 

03/28/89 

Musyck et al. 


3f 0 

^ y V 



4 817 140 Ji 

03/28/89 

Chandra, et al. 



Ida rf fsPk - 

—0- 

4,827,508/^ 

05/02/69 

Shear 

3 J'O 




4,864.616/1 

09/0S/89 

Pondet al. 

^fO 







4,866,769 a 

09/12/89 

Karp 

7(?0 



n/? 

4,868.736^ 

09/19/89 

Walker 


2-0 0 


f^. ^ 

^ — 

.4.888,798^ 

12/19/89 

Earnest 

350 

^" 



4,893»248^ 

01/09/90 

Pitts etal. 

Ib"?^ ■ 





4,893,332/) 

01/09/90 

Brown 


n . 

^ T7 "^TT f ( / (r u 


4,919,545/1 

04/24/90 

Yu 






4.926,480^ 

05/15/90 

Ghaum 





4,937,863 

06/26/90 

Rot>ert et al. 


Y ■ 






4,941. 176^ 

07/10/90 

Enescu et al. 


Y 


—^2 _ 

4,953,209^ 

08/28/90 

Ryder, Sr. etal. 




—.22 

4,962.533 ^ 

10/09/90 

Krueger^ al. 



■Q:Lf of/^e? 


Page 2 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

Apptn. No. 

09/870.801 


Applicant 

KarlLGinter. etal. 





Filing Date 

June 01, 2001 


Group: 

2132 






Examiner 
Initiar 

Document 
Number 

Issue Date 

Nanne 

Class 

Sub 
Class 

Filing Date 
If Appropriate 

— # 

4.975.647 ^ 

12/04/90 

Downer ei al. 



t / i / /I ^ 

v 



4.975.878 /f 

12/04/90 

Boddu et al. 





4.995.082 4 

02/19/91 

Schnon- 


' 



5,014.234^ 

05/07/91 

Edwards, Jr. 





5,022,080 

06/04/91 

Durst et al. 





5.027,397 ^ 

06/25/91 

Double et ai. 




ir 
ATI 

5,032,979 

07/16/91 

Hechtetal. 




,^ 

5.058,162 fi 

10/15/91 

Santon et al. 




■ '} 

5,065,429 if 

11/12/91 

Lang 




^ 

5,079,648 f) 

01/07/92 

Maufe 



0^(2.0/1 90 

—^2 

5,103,459 /) 

04/07/92 

Gilhousen et al. 


/ 



5,109*413 ^ 

04/28/92 . 

Comefford et al. 



lilWIiH? 

■ 

5,113,518 

05/12/92 

Durst. Jr. et al. 


rro 


— 0- 



5,126,936 ^ 

06/30/92. 

Champion, et al. 





5,129,084 ^ 

07/07/92 

KeDy. Jr. et al. 



Ok/ 2^1/90 



5,138,712^ 

08/11/92 

Cort)in 




--^ 



5,150.407 ^ 

09/22/92 

Chan 


'i- 



5.164;988^ 

11/17/92 

Maiyas et ai. 

—7 k ^ 

b $0 


/D/J///;i'/ 



5,191.573 ^ 

/\o MO mo 

03/02/93 

riair 



0H(9li99Q 



5.199.066 ^ 

03/30/93 

Logan 



0¥/liP/ifi?9 

^ 

5,199.074^ 

03/30/93 

Thor 


•ro • 

o//oU/99l 

— # 

5,204.897 ^ 

04/20/93 

Wyman 



Qll(U//91X 



5.205.951 

04/27/93 . 

Khoyi et at. 








5,218.605 /} 

06/08/93 

Low et al. 






06/22/93 

Waite. et al. 



Q^h^lc9f( 



5,227,797 ^ 

07/13/93 

Murphy 


T-.'L 




5.241.671 ^ 

08/31/93 

Reed, et al. 



iQ(i-b/(9^9 

: 

5,251.294 f 

10/05/93 

At)elow ' 


('a 

■ ■.oUoilfUQ 

Page3<rf38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION . 


Alty. Docket No. 07451.0001-18000 

Appfn. No. 09/870,801 

Applicant Karl L. Ginter; el al. 

Filing Date June 01, 2001 

Group: 2132 


Examiner 

iniilal 

Document 

M limber 

Issue Date 

Name 

Class 

Sub 
Class 

Filing Date 
tf Appropriate 

—i^ — 


11/09/93 

Wvman 

-/ V y 

u 

^' i < S f ( ^ ^ 

— ^-^ — 

0,^0,1.0 f a 



7 9iC 

fn (J U 


^ — - 

o^zoOfioo 

1 ■/ luirsO 

Ionic 

n Qr 


Cxi J { C-/ , Q.0 (y 

— - 



nUWcU oL al. 

1 Or 


/I hi / f 9 9 / 
iHihi in 1 



no/ni/ciA 

niMoicy t?i cti. 


7 0 

0 //J ^( f Y/L 

^ 

5,287,407 ^ 

uZf lOfy** 

nuifTics 

") Di] 



— ^ — 



5,291 ,oyo A 

ni/n 4 /Q>i 

orurHjy 



r\U./ nl / fO f}-) ' 
^fl 0 11 IrY u 

-4^ 

5,301 ,3d£D /f 


Linneu 6i ai* 

J /J 

/O 1/ 

U f I ^Tl (i if 


o,oiv,/oo ft 

UOfl/f 

~(CtK>0 CI di. 

i n 

T / 1 / 

' ' 11 1 rf / 






J /<\ 


/i ill {\ 1 1 { } 9l 

-/ 


08/02/94 


1 L\/ 
i ^ 


n/A -7/ JQQ^ 
Uifl' // / ^JL 

— 

— # 


08/02/94 

Fat>bio 

i n 

/I f) 



5 337 357 a 

08/09/94 

Chou et al. 


u 

T — .. 

hi 111/ r9<^? 

— 

5 343 526 /? 

08/30/94 

Lassers 

1 ^ 0 

u 


—jp. 

15,349,642 

09/20/94 

Kingdon 

liP n 


III 62// 9 9'^ 

0- 

— # 

5,355,474 4 

10/11/94 

Thuraisngham, et al. 





5,359,721 ^ 

^OI25m 

Kempf et al. 




/ ■ 

(W 

5,361,359 ^ 

11/01/94 

TajaBi et al. 





5,365,587yj 

11/15/94 

Campt)ell, et at. . 



OUi 0//P91 

— -Z-^- ■ ■ ■ 

—^2 

5,367,621 /I 

11/22/94 

Cohen et al. 




— - 

5.369,702 /) 

11/29/94 

Shanton 


H 


— 

5,369.707 

11/29/94 

Follendore, III 




-4L 

5,371.792^ 

12/06/94 

Asai et al. 





5.373,440 

12/13m 

Cotien et al. 



Qkiom /i/ri 

—n 

5,383,113y, 

01/17/95 

Kight et al. 



61 M /ff/ 


5.390,297 

02/14/95 

Bart>er et al. 




-4L 

5.412.717 1^ 

05/02/95 

Fischer 


H 


— ^2 

5.418.713 /> 

05/23/95 

Allen 

3wif 




Pa9e4of38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. E>ocket No. 07451 .0001-1 8000 

Appln.No. 09/870.801 

Applicant Karl L. Ginter, et al. . 

Filing Date June 01, 2001 

Group: 2132 


Examiner 
iniuai 

Document 

MiinriKpr 

Issue Date 

Name 

Class 

Sub 
Class 

Filing Date 
tf Appropriate 

—M. 


05/30/05 

Michali 


? 1 

• fflJr)// l99U. 

Ulf f / / jT' . 

— # 

0,4^1 .UUO /j 


lAhlAn pt al 

UaUlvli VI Cil* 

-f /J 


• n U-/ 1 1 lb Oll 

0 r//o/ (UT 


5,432.oo1 ^ 


ocnetui ei ai. 


>\~ 

(^{^(( I'H 

0—^ 

— 

5,432,928 

U//1 i/yo 

onefTnan 

In 

Coo 

11/(0/ / 


5,43o,OUo^ 

no/n't /QC 

vvyincui 


/ / /) / 

t-f (/ / 

Ad J / n / 1 /I /) \ / 


5,440,Oo4 ^ 

Uo/uo/yo 

jonss 61 ai. 

•> n\'\ 

■ ^ tr ^ 

• 7 N^- ■ 

■^Xl Ik 1 [rU 

—f 

5,450,490 /^j 

uy/iz/yo 

Jensen ei ai. 

]f 0 

f 

\o 

M/?// ir/^ 


5,457,747/^ 

•f A/l A/AR 

10/1 o/yo 

urexier ei ai. 


7 (/ 

/f / / / / // IQOi/ 

P- 




in/1 7/Qf\ 

rXIUiUI dl. 


A? b 

r> iO/n n / Vo Q7 
oVlZ^if /y/A 


C AQn O'i R A 
D,4yU,^1D fj 




T 

[jf 1 <A( (fl-j 

—f- 

. 


08/1 1/Qf) 

Kiint ^ al 

7 7 

w / 

hi h iO/ /I9u 
QI { L^f L '/Sr 



07/09/96 

ShocJclev et al. 



/7 Jlr//^9^ 

iLfi^ fiy/y 

— / 

c 535 322 

07/09/96 

Hecht 

d /) 



— 

5 557 798 A 

09/17/96 

Skeen et a). 

) 1 \ 


[Uul i9U 


5 574 962 4 

11/12/96 

Fardeau et ai. 


I 

J— 


0^ - 

5.577^94 

11/19/96 

Boyle et aL 

.1 ' J . ... 

200, Ofe 


^ 

5,581 ,800 

12/03/96 

Fardeau et al. 



■Oh/oi/ {PPr 

^ 

5,603,031^ 

02/11/97 

White etal. 





6.625.693/^ 

04C9/97 

Rohatgi et al. 



01/01/ /9f<^' 

rf^- 

5,629,770 ^ 

05/13/97 

Brassil et al. 




^ . 

6,634,012^ . 

05/27/97 

Stefiketal. 

?Ar • 

zj9- 

f//l1H9H 


5.636;276 1 

08/03/97 

Baigger 








5,649,099 ^ 

07/15/97 

Thetmer et al. 






5,671,279^ 

09/23/97 

Elgamal 



i//n/(')ls- 



5,678,170 ^ 

10/14/97 

Grube, et a!. 



[0/ oS-li^H 

^ 

5,689.565 /f 

11/18«7 

Spies et al. 



0^/Uli^k 

-r-^ 

5,689.566 (\ 

11/18/97 ; 

Nguyen 




^ 

5,692.047/1 

11/25«7 

McManis . 


y 

i^/o^//m 


Page 5of.38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

Appln. No. 

09/870.801 


Applicant 

Karl L. Ginter, et al. 





FHing Date 

June 01. 2001 


Group: 

2132 




Examiner 

Initial* 

Document 
Number 

Issue Date 

Name 

Class 

Sub 
Class 

Filing Date 
If Appropriate 

UP 

5 699 427 A 

12/16/97 

Chow et al. 


1 

^ " / M / ' ] 

■IP 

1 71S 314 ^ 

02/03/98 

Payne et at. 

5* fr 0 

^ T 


— ^jL- — ^ 


02/03/9B 

Stefik 



all 1 1 

an 

«i 791 Tflfl A 

02/24/98 

\J*J £*t/ 9U 

Pouvell et al 

J (f^ 

/ n n 

{DI \ 1 / /9h 


c 701 Tftfl A 



n 

/ C/ w 



0,/fc^,*»^*» a. 

\J*Ji \J%M 

^3111 VIU 

'7 1£) 11 


V//; i^//7/r 

_^2_ 



wlKlMyt t7l al. 


AT 

n L 1 / n 1 /Q S\y 

# 

: 

c TOO QQP j3 




\ 

J// /}9 //Q^ 
((( 07 (tJ^ 





/o / 

Q 
/ 

(A) If / ( / //] 

-t 

C 77^ 070 /t 

06/30/98 

Gotden et al 

/ t3.\ 

r 9 

U f { f / / / 

- 


07/28/98 

Fardeau et al. 

*-ri 1 

2 


M 

5 802 590 /9 

09/01/98 

Draves 

( u 


(Unf /f'^Kc 

— M 

5.845^81 /f 

12/01/98' 

Benson et al. 

-Xii-Z — 



— M 

5 892 899 /? 

04/06/99 

Aucsmith et al. 

? .1 



— M 

5.910.987 

06/08/99 

Ginter et al. 

? p ft 



^ 

5.940,504 ^ 

08/17/99 

Griswoid 





5.956.408 A 

ra/21/99 

AmokJ 

3«30 



■ W 

a/1 



5.966.440 ^ 

10/12/99 

Hair 




A/1 

5,976.484^ 

f1/02/99 

Apperson et al. 








5,999.949^ 

12/99 

CrandaQ 




— 41 

6.016.393^ 

01/18/00 

White et al. 


(bp] 



6,102.965^ 

08/00 

Dye et al. 


/ 


— ¥^ 

^. 

6,135.646^ 

10/24/00 

Kahn et al. 

■7 n 




6.363.488^/ 

3/02 

Ginter et al. 



0^1 nil 999 

—0- 

^ 

6.389.402^5.^ 

5/02 

Ginter et al. 

7 or 

,r/. ■■ 



6.427.140 

7/02 

Ginter et al. 



tf/6ll(999 

— m 

6.449.367 ^ JL 

9/02 

Van Wie et al. 




— ^ 

6.618.484 y^2. 

9/03 

Van Wie et al. 


2-72. 



Page 6 of 38 


0MB No. 0651-0011 


INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451.0001-18000 


Appln. No. 


09/870,801 


Applbant 


Karl L. Ginter, et al. 


Initial* 

Document 
Number 

Issue Date 

Name 

Class 

Sub 
Class 

Filing Date 

%M * ■ia4atji 

If Appropnate 

fp 

6,640,304 4 1 

10/03 

Ginter et al. 





6.658,568 

12/03 

Ginter et a). 

'in 

192 ■ 


0P 

6.668,325 § / 

12/03 

Collberg et al. 

m 



Examiner 
Initial^ 

Document 
Number 

Publication 
Date 

Country 

Class 

Sub 
.Clasa 

Translation 
Yes or No 


EP0 367 700 A2 

05/09/90 ' 

EPO 

Gq\>F 





EP 0 567 800 Al 

11/03/93 

EPO 






BP 0 653 695 A2 

05/17/95 

EPO 




p 

DE 3 803 982 4 / 

01/25/90 

Germany 






DE 2943 436 Al 

10/26/79 

Germany 

6^0 (PA: 



^2 

JP 06-225059/ 

12A)8/94 

Japan 





WO 96/27155/^ L 

09/06/96 

PCT 


1/01} 



Examiner 
Inltiar 


OTHER DOCUiyiENTS (Including Auttior, Title, Date, Pertinent Pages, etc.) 


Abadi. M. et al„ "Authentication and Delegation with Smart-cards," Technical Report 67. DEC 
Systems Research Center, Octdt)er 1990, available at 

<http7/citeseer.nj.nec.com/artide/abadi92authentication.htm», 22 pa^. 


Abadi. M., et al., "A Calcutus for Access Control in Distributed Systems", Digital Equipment 
Corpwation, Feb. 28. 1991, revised August 28. 1991. . 


-4L 


Abrams. I^rshall D. -Renewed Understanding of Access Control Policies-. Proceedings of the 16 
Computing Natioal Security Conference, 1993. \ ' 


Aharonian. G.. -Software Patents - Relative Comparison of EPO/PTO/JPO Software Searching 
Capabilities,* Source Translation & Optimization. ^ 


Anderson, R.. "Why Cryptosystems Fail." Uftiversity Qomputer Laboratory. Cambridge, 
Massachusetts, (undated), pp. 1-34. ■ • 


Antonelli et al, -Access Control m a Workstation-Based Distributed Computing Environnwnt.' CITI 

Technical Report 90-2 (July 1 7. 1990): . 

Arms, W.Y.. "Key Concepts In the Archaecture of the Digital Ubrary." D-Lib Magazine. (Jul. 1995). 


Atkins, D., et al.. 'The Magfe Words are Squeamish Ossifrage," (undated). 15 pages. 


Atkinson, R.. -Security Architecture for the Internet Protocol," Netwmrk Working Group RFC 1825 
(Aug. 1995). • \ __; 


Page7of 38 


0MB No. 0651-0011 


INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

1 Appln. No. 

09/870,801 

Applicant 

Karl L. Ginter, el al. 



Filing Date 

June 01.2001 

Group: 

2132 


Examiner 
Initial* 


OTHER DOCUMENTS (Including Author, THte, Date, Pertinent Pages, etc) 


Aucsmith. D.. et ai.. -Common Date Security Architecture." Intel Architecture l^b. Presentation 
Material. January 22. 1996, pp. 1-16. 


Aucsmith. David, Tamper Resistant Software: An Implementation'. lAL. ^ . 

Avery, et al.. "Recommender Systems for EvaluaUng Computer Messages." Communications of the 
ACM,'pp- 88-89 (l^r. 1997). • 


Baker. R.H., Tha nomouter Rpniritv HandfeQoK. Tab Books. Inc.. 1985. 


Balbanovfc. et al.. "Content-based. Collaborative Recommendation. Communications of the ACM. 

pp. 6 6-72 (Mar. 1997). 

Bartock. P.F.. et al.. "Guide to Securing Microsoft Windows NT Networks." Nattortal Security Agency. 
September 18. 2o6'l, pp. 1-132. 


Bellare. M.. 'iKP-A Fa mily of Secure Electronic Payment Protocols." April 16. 1995. pp. 1-19. 

Bellovin S.M.. "Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictronary 
AttS" ^o(iediSsof the IEEE Symposium on Research in Security and Pnvacy. Oakland. 
California. May 1992. 13 pages. . ^ 


an 


Bellovin. S.M.. "There Be Dragons." AT&T Bell Laboratories. August IS. 1992. 16 pages. 


Bender et al. Techniques for Data Hiding." IBM Systems Journal. Vol. 35. Nos. 3&4 (1996). 


Berghal et al.. "Protecting Ownership Rights Through Digital Watermaridng." IEEE Computing. Vol. 
29. No. 7 (Jul. 1 996). ' 


Bemers^.ee. T.J.. et al.. "Networtted Informatton Servtoes: The Wortd-Wide Web." Computer 
Networits and ISDN Systems. 1992. pp. 454-459. 


Bernstein et al.. "Copyrights. Distributton Chains. Integrity, and Privacy: The Need for a Standards- 
Based Solution." He ctronIc Publishing Resources. ■ ' 

Bertmo. Bisa, "Data Hiding and Security in Object-Oriented Databases." Dipartimento di Matematica. 
Universita di Gendva. IEEE. 1992. pp.33&-347^_ ^ ; 


Bickel. R.. et ai.. "Guide to Securing Microsofl Windov« XP." National Security Agency. October 30. 

2002.'pp.'l-129; . 

Binell Andrew D.. et al.. "A Global Authentfcation Service Without Global Trust." Proceedings of the 
IEEE Symposium on Security and Privacy. Oakland. CaBfomia, April 1986. pp. 1-11- 

Bishop. M., "Anatomy of a Proactive Password Changer." Department of Matftematks and Computer 
Science. Dartmouth College, (undated). 15 pages 


4L 


Bishop. M.. "Privacy-Enhanced Electronic Mail." Privacy and Security research Group. lAB 


Blaze. Matt, et al.. "The Architecture and Implementaiton of Networti Layer Security Under Unix". 
Columbia University and AT&T Bell Laboratories. 1994. ; 


Page 8 of 38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-1 8000 

Appln. No. 09/870,801 

Applicant Karl L Ginter. et al. 

Filing. Date June 01, 2001 

Group: 2132 


Examiner 
Initial* 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 

—4^ 

Blaze, Matt, 'A Cryptographic File System for Unix," pre-print of paper for Rrst ACM Conference on 
Computer and Communications Security, Fairfax, Virginia, Nov. 3-5.1993. 8 pages. 

— <^ — — 

Blaze, Matt, el al., "Decentralized Trust Managemenf Proc. IEEE Conference on Security and 
Privacy, May 1996. 


Blaze, M., "Key Management in an Encrypting Fife Systems, * Proc. Summer 1994 USENIX 
Tectinical Conference (Jua 1994). 

^ 

0- 

Boisson. Jean-Francois, "1-Business Perspectives and Requirements. 2-The QTED Project Ksys 
and Knowledge," CITED 5469. 


Boisson. Jean-Francois, "How to CITEDise Application: Guidelines and Examples," CITED 5469. 

# 

Boisson, Jean-Francois, 'Management of Intellectual Property Rights in the Bedronjc^CofTwnerce: 
Textile Design.Sales and Other Similar Initiatives," EURITIS. 

— # 

Bdsson, Jean-Francois, "Software Components; Deliveratrfe Tnal Offer, CITED 5469. 

■ / ■ 

Boly, J.P., et al. The ESPIRIT Protect CAFE: High Secunty Digital Payment Systems, ESCORICS 
94, European Symposium on Research Computer Security. Springer-Verias Bertin, 1994, pp. 217- 
230. 



Boone. J.V.,et aL, "The Start of Digital Revolution: SIGSALY Secure Digital Voice Communications in 
Wortd War 11," Decemljer 10, 2002. 

— 

— ^ 

Borenstbin, N., "MIME Extensions for Mail-Enabled Applications: Application/Safe-Tel and 
Multipart/Enabled-Mail," November 1993, 24 pages. 



Bom. E. el al., "Discretionary Access Control by Means of Usage Condilions." Computers & Security, 
vol. 13. no. 5. 1994. pp. 437^50. 


Bos et al., •SmartCash: a Practical electronic payment System, Center for Mathematics and 
Computer Science, Report CS-R9035. 


Brands, S., "Untraceable Off-line Cash in Wallets with Observers," CWI, (undated), 17 pages. 

— #2 — - 
— ^ 

Brassil et al., "Electronic Marking and Identification Techniques to Dfecourage Document Copying," 
AT&T Bell Laboratories, Proc. Infocom 94, 1994. ' 

^2 

Breon, R.^ et al., "Microsoft Office 97 Executable Content Security Risks and Countemieasures." 
National Security Agency. December 20, 1999, pp. 1-44. 

4^ 

Brickell. E.F., et al,, "The SKIPJACK Algorithm," July 28, 1 993. pp. 1-7. 

0- 

Brin, Sergey, et al.. "Copy Detection Mechanism for Digital Documents", Stanford University. 

0^ 

Brockschnrwdt, K., 'A Primer on Designing Custom Controls," Microsoft Systems Journal, March/April 
1992, pp. 87-101. 


Brockschmldt. K., "Implementing OLE 2.0, Part III: Uniform Data Transfer with Data Otjjects," 
Microsoft Systems Journal, December 1993, pp. 47-77. 


Page 9 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

1 Apptn. No. 

09/870,801 

Appltcant 

Karl L Ginter, et al. 



Filing Date 

June 01, 2001 

1 Group: 

2132 


Examiner 
Initiar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 


Brockschmidt. K., Introducing OLE 2.0. Part 1: Windows Objects and the Component Object Model .• 

Microsoft Systems Journal, auqusi lyao, pp. lo-^o. 


Brockschmidt, K., OLE 2,0 Part II. impiemenung a oimpie winaows v^ojei^i uwny ciuitn o ur 
Microsoft Systems Journal, October 1993, pp. 45-62. 


Rrrvticschmidt, Kraig. Inside OLE 2. Microsoft Press rrogrammir^ c>enes, lyw. 

— #2 — : 

Brown, C.W., Secunty for Minicomputers artd Microcompuiers, (unoaiea;, pp. ^oo-^o. ^ 


Brown, Patrick W., 'Digital Signati^es: Can They Be Accepted as Legal Signatures in EDI?." 1"^ 
Conference on Computer and Communication Security. NovemDer 1993. pp. w>-9Z. 



pnimm P al fi03a6/80486 Assembly Lanauaae Proarammlna, WIndcrest/McGraw-Hill, 1993. 

W- 

Brunnsteih et al.. "Intellectual Property Rights and new Technologies," Proceedings of the KnbwRight 
•95 Conference (Aug. 1995). 

— # 

Bureau Van Dijk Management Repon tor i asK 4.0. reasiDimy oiuay 01 uie v^iuw «ycn^y, 

—f- 

A/} 

Bureau Van Dijk: GesUon Des Contrats; 497C.C.C.E.: CITED (SUITE). Feb. 1993. 

-(^ 

Bums, Christopher, "AAP Draft Local Access and Usage Controls", Association of Amencan 
Publishers Rep(Kt. April 13. 1995. 


Caben, D.. et al., "Software Protectkm," May 1985, pp. 35-37. 

0L- 

Galas C, "Distributed File System Over a Multilevel Secure Architecture Problenr^s and Sojutfons," 
Compniter Security, ESCORICS 94. Brighton, United Kingdom, November 7-9,1994, pp. 281-297. 


Case, J.. -A Simple Networic Management Protocol (SNMP)/ Networtc Working Group. May 1990, 
pp. 1-21. 


rafttann, S. et al„ Database Security. Addison-Wesley & Acm Press, 1995 

— ^ 

Phase Chew M D "C^scStore (Electronic Publishing Resources 1991). 

.. 

Chaum et al., "Wallet Databases with Observers," CWI, Aarhus University, Advances in 
Cryptography, Proceedings of Crypto ^2, pp. 89-105 (1992). 

— 4^. — 

Chaum. D., "Privacy and Social Protectwn in Electronic Payment Systenrts.- Chapter 12. The Future 
of Money in the Infomnation Age. 

—4^ — 

Chaum, D., 'Untraceable Electronc Cash," Extended Abstract, Center for Mathematfcs and 
Computer Science, 1988. pp. 319-327. 

— ^ 

Hhaum. D.. Smart Card 20C«. Elsevier Science Publishers, 1991. 

0^ 

— ^ 

Chaum, D.L., et aL, "lmplenr»enting Capability-Based Protection Using Encryption.' College of 
Engineering, University of California, Bertceley. July 17, 1978. 12 pages. 

-^-M 1 

Chaum. David, "Achieving Electronic Privacy." Scientific American, August 1992, pp. 96-101. 


Page 10 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty Docket N6. 07451,0001-18000 | Appln. No. 09/870.801 

Applicant Kari L Ginter, et al. 

Filing Date June 01. 2001 | Group: 2132 

Examiner 
Initial* 

OTHER DOCUMENTS (Including Author. Title. Date, Pertinent Pages, etc.) 


Chaum DavkJ "Security Without Identification: Card Computers to Make Big Brother Obsolete, 
.riouioHon AiiniKf 23 2002 at <httD://www.chaum.com/articlesASecurity WthoutJdertificationJitinl> 

pp. 1-24. 

^ 

Chaum. David, 'Smart Card 2000." Selected Papers from the Second International Smart Card 2000 
Conference. Oct 4-6. 1 989. 

. 

Chor et al., Tradng Traitors." Crypto 94, p. 257 (1 994). 

# 

ju,— . KM At oi •rvkowrinht Pmipriion for El'^clronic Publishing Over Computer Networks, 

AT&T Belt Lalwratories, Murray Hill. NJ. June 1994. 18 pages. 



Oioy D M.. et al.. "A Digital Ubrary System for Periodicals Distribution". May 1996. 

— ^ 

> ^ .1 MABN/oo- A ^^^\^ VAt-L4mun QA/*jiriK/ ^v/Qt^iTi PC Software Asset Protection Concepts, 
Cina Jr et al.; ABYSS; A Basic YorKiown i>ecuruy oysiern r-^ owiwoic r^^\ r ivw^^wi. 

IBM Research Report No. «C 12401. IBM Thomas J. Watson Research Center (Dec. 18. 1986). 

\ 

r^A, Poni r rtni "BlTB- A Smartcard Protected Operatirffl System," Communications of the 
ACM.' vol. 37. no. 11, Novemljer 1994, 66-94. 

^ 

Clarke et al.. "Cryptography Issues in Plain Text." Privacy Law and Policy Reporter (1996). 



rnad Peter -Obiecl-OriCTted Patterns." Communications of the ACM. vol. 35, no. 9, Septemt)er 
1992. pp. 152-159. 

■ 

QL. 

r«hpn FB Protection and Securitv on the Information Suoerhiahwav. John Wiley & Sons. Inc.. 
1995. 


Cook. S., 'Net Results," PC World. December 1985, pp. 270-328. 


Corbato. F J., et al.. "Introduction and Overview of the Multfcs System." viewed on November 13, 

oAn<4 ^KHr\>//iAfufuu miiHvMArK nrn/ftccl html> DD. 1-18. 

9^ 

■ / . 

Cornish. Graham, "Copyright Management of Document Supply in an Electronks Age," The aTED~ 
cniiition intorlendlna & Document SuddIv. Vol. 21, No. 2, 1993, pp. 13-20. 


Cousins, Steve B. et al., -InterPay: iWanaging Multiple Payment Mechanisms jn Digital Ubranes. 

^1 ^ 

Coutrot. Francois, et al.. "A Single FConditional Access System for Satellite^bte and Terreslnal 
XV" IEEE Transactiwis on Consunwr Electronics. VoL 35, No. 3. Aug. 1989. 


Cox B."Superdistribut»n," Wired, September1994,2.pages. 



Cox Benjamin et al.. "NelBill Security and Transaction Protocol.- Carnegie Melton University. 

—0- 

Cox. Brad. "What If There is a SBver Bullet and the Competition Gets it First?." Joumal of Object- 
Oriented Programming, Jun. 1992. 

—M- 

Crocker et aL. "MIME Object Security Servfces." NetworK Working Group RFC 1848 (Oct 1995). 


Curry P ft "^'^ system Rfimrityt A Guide for Users and Svstem Administrators. Addison-Wesley 
Publishing Company, Inc., 1992. 



0. 

Curry, DavkJ A.. "Improving the Security of Your Unix System " Final Report April 1990. pp. 1-74. 


Pag6 11 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-1 8000 

Appln. No. 09/870.801 

Applicant Karl L. Ginta^. et aL 

Fifing Date June 01, 2001 

Group: 2132 


Examiner 
Initial* 

OTHER DOCUMENTS (Including Author, Title. Date. Pertinent Pages, et&) 

^2 . 

riiQtftr, H. Inside vyindows NT. Microsoft Press. Redmond WA. 1993, 

/lO 

riifttftT H„ Inside the Wine^gws NT File System. Microsoft FYess. 1994. 

^21 1 

Cybenko, G. et a!., "Cognitive Hacking: A Battle for the Mind." Computer, August 2002, 0018- 
9162/02©2002 IEEE, pp. 50-56. 


Date, CJ.. "An IntroducUon to Datatxase Systems." 4^ Ed., Vol. 1, Addison-Westey Publishing 
Company,. 1987. 


Pjiwas, D W ; Price, W.L.: Security for Computer Networks. John Wiley & Sons, 1984. 

0- 

Davin. J., et al.. "SNMP Administrative Model," Network Working Group, July 1992. pp. 1-22. 

^ 



Davis. D.. et a!., "Network Security via Private-Key Certifrcates," MIT Project Athena, (undated), pp. 
1-4. " * 

iP. 

Deering. S.E., "Host Extensions for IP Multk:asting." Network Working Group, RFC 1112 (Aug. 1989). 


Dempsey, l-orcan, et al.. "The Warwick Metadata Workshop; A Framework for the Deployment of 
Resource Description," JuliAug. 96. 

W- 

' an 

r^nninq. A.. OLE Controls Insicte Out, Microsoft Press. 1995. 


nAnninn H P ''^oriim PM^nriAl tVimniitina In an Insecure Network." Communications of ttie ACM. 
August 1979. Vol. 22, No. 8, pp. 476-482. 

— ^2— 

^ 

running. D.. Crytoqraphy ar)d Data Security. Addison-Wesley Publishir^ Company, Inc.. 1982. 


n»nntnn fkirnthv t= R. CrvDtoaraohv and Data Security. Addison-Wesley Publishing Company, 
1982, Reprinted with correctbns, Jan. 1983.. 

_^ 

nftnninq. P J., Computer Under Attack: Intruders. Worms, and Viruses. ACM Press, 1990. 

P/) 

Deulsch. P.. "GZIP File Format Specification Verston 4.3." Network Working Group, May 1996, pp. 
1Z 



Diffie. et al.. Privacy on the Une: The Po!itk:s of WiretaoDina and EncrvDtkKi. Massachusetts Institute 
ofTechnokDgy, 1998. 


Diffie, WhItfieW. "Authenticatfon and Authenticated Key Exchanges', Sun Mkrosystems and Bell- 
Northem Research. March 6. 1992. 

H^L. 

__4L_ 

Diffie. Wh'itfieW. -The First Ten Years of Public-Key Cryptograph/, Proceedings of the IEEE, Vol. 76, 
No. 5. May 1988. 


Diffie, WhitfieW. et al., "New Directions in Cryptograph/, Stanford University, 1976. 


DiLascia, Paul, 'OLE Made Almost Easy: Creating Containers and Servers Using MFC 2.5." 
Microsoft Systems Journal, April 1994, pp. 13-33. 

esO 

Dosler et al., "Third-Party Authenticatbn in the Institutional File System." Center for Information 
Technotogy lntegratk>n. 


Page12of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-18000 

Apptn. No. 09/870,801 

Applicant Karl L Ginler, et al. 

Filing Dale June 01. 2001 

Group: 2132 


Examiner 
Initiar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 


rviitghftrty, D., et aL, The Mosaic Handbook for the X Window System, C Reiliy & Associates. 1994. 

• /« 

Downs, D.D., et aL, 'Issues In Discrettonary Access Control," Proceedings of the 1985 Symposium 
on Security and Privacy, April 22-24, 1985, Oakland. California, pp. 208-218. 


Dukach, S.. "SNPP: A Simple Networic Paymert Protocol," MIT Laboratory for Computer Science, 
(undated), 7 pages. 

— ^ 

Eastlake III et al., "Randomness Recommendations for Security," Networt< Working Group RjFC 
1750, Dec. 1994. 


Eastteke III, D./Physlcal Unk Security Type of Service," Networic Worthing Group RFC 1455 (May, 
1993). 

— # 

Ebersol, Josepn, rroiecnng inieiieciuai rroperjy i^ignii ori uie mh maii^i 
1994. 

AO 

Eizenberg, G., " Contribution of Information Technology Security to Intellectual Property Protection, * 
CERT-DERI. 

— 

Epstein, J., "A Trusted X Window System Server for Trusted Mach," Usenix Association 
Proceedings, Mach Workshop, Octol>er 4-5, 1990, Buningion, vermora, pp. i4i-iaD. 


Erickson. John S.. "A Copyright Management System for Networtie Interactive Multimedia", . 
Proceedings of the 1995 Dartmouth insiituie lor Aovanceo uraauaie oiuaies, 1990. 


EncKson, Jonn 0., Kignis Managemeni 1 nrougn tiHiariceu /muiuuuuii ^ rio&tjiiieu n^c i 
Proceedings, June 1996. 

fil 

Everett. DavkJ B., "Smart Card Tutorial-Parii 1 ," Sep. 1992. 

— #2 

_^ 

Carmor H *ThA PHP^ <%Ariirih/ ChfH^cM* Svstem ** Jutv 10 1992. 


Feistel. H. "Cryptographic Coding for Data-Bank Privacy," IBM document RC 2827 (Mar. 18, 1970). 

if 

^ 

Ferraiolo. D.. et al., "Role-Based Access Control," Reprinted from the Proceedings of the 15^ 
National Computer Security Conference, 1992, pp. 1-11. 

M 

Fine. T.,et al, "Assuring Distributed Trusted Mach," Secure Computing Corporatton, 1993. 13 pages. 

— 

Finin et al., "A Language and Protocol to Support Intelligent Agent Interoperability." Proceedings of 
the CE & CALS, Washington 92 Conference (Apr. 1992). 


Forcht. K.A.. Comouter Security Manaoement Bovd & Fraser Publishing Company. 1994. 


Franklin, M., et al., "An Overview of Secure Distributton Computing." March 24, 1992, pp. 1-46. 



Franz, M., "Technotogical Steps Toward a Software Component Industry," Institut fur 
Computersysteme, Zurich, Switzerland, (undated), 23 pages. 


Frederick, Keith P.. X^ertificatton and Accredrtatfon Approach", Air Force Cryptologic Support Center 
(OL-FP). 

m 

Fuchsberger et al., "Public-key Cryptography on Sn«rt Cards," Information Security Group. 


Page 13 of 38 


INFORMATION DISCLOSURE CITATION 


0MB No. 0651-0011. 


Atty. Docket No. 07451 .0001-1 8000 

Appln. No. 09/870,801 

Applicant Karl L Ginter, et al. 

Filing Date June 01. 2001 

Group: 2132 


Examiner 
Initial 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, eta) 

— - 

FuginI, M., et al., 'Security Management In Office Information Systems," Computer Security: A Global 
ChaUenge, 1984, pp. 487-498. 

— - 

Fiiaini M G al 'Authorization and Access Control in the Office-Net Svstem.' CoitiDUter Security 
in the Age of Infonnation, 1989. pp. 147-162; 


f^aiuin oi nl "^priirih/ Pmtncnts for version 2 of ttie Simole Network Manaaenient Protocol 
(SNMPv2)," NetwOTk Working Group RFC 1446 (Apr. 1993). 


/^oK/in t <»t a1 'f^MMP Secijfitv Prrtfocc*l«; " Network Workino GrouD Jutv 1992 ob 1-26 


Gamble, Todd. *lmplenDenting Executton Controls in Unix," Usenix Assodatbn. Proceedings of the 
CAuonth ^u<:tpn^ AHmintQh'atinn CnnfprAnr^ November 1-5 1993 Monterev California dd 237- 

242. 



GarfinkeL S.. PGP: Prettv GocxI Privacv. O* Reillv & Associates. Inc.. (undated). 

fl 

Garfinkel, Sanson, et al.. Practteal UNIX Security. O* Reillv & Assodates. Inc.. 1991. 



Gasser. M., et al., The Dtgitaf Distributed System Security Architecture," Reprint from the 
Proceedings of 1989 Natwnal Computer Security Confererice, 1989, pp. 1-13. 


Gaster, J. L., "Authors' Rights and Neighboring Rights in the Informatkm Society," DG XV/E/4, 
European Commission. 


Gffford, D., et al.. The Cirrus Banking Network," Communrcattons of the ACM. vol. 28, no. 4, August 

iCIA<% nn 7Qft..ftn7 
1 9OO, pp* ' 90-0v f • 

— - 
— ^ — 

Gifford, D.K., 'Cryptographfc Sealif^g for Infonmation Secrecy and Authentfcation," Communk:atk>ns 

AffthoAPM uTkl 9S nn A Anril 1€lft9 nn 77d-7Hfi 
OT Ulc MV^WI. vol. ZD, IIU. r^XII p(J. £.t*f~^0\J. 

— 0. — 

Gttde R *DAT*HeadS' Freouentlv Asked Questions " 1991. Release 3.1 (Sep. 2. 1992). 


Gircys. G.R.. Understandlno and Usinq COFF. CRellly & Assodates. Inc. (Nov. 1988). 

— 9^ 

Glatzer. H., 'The Promise of LANs MIS Back in Control." Software News, March 1985, pp. 51-58. 

— 

Gligor, V.D., et al., "Object Migratfon and Authentcatfon," IEEE transactk)ns on Software 
Engineering, vol. SE-5. no. 6, November 1979, pp. 607-61 1. 

— ^ — — 


Gong, U, "A Secure Identity-Based Capability System," University of CambrkJge Computer 
Laboratory, January 1989. pp. 1-15. 



Goodman, Bill, "Compactor Pro." 



f?nRiftr, James. "Software Protection: Mvth or Reality^. Lecture Notes in Comouter Science. 
Advances in Cryptoloay - Crypto '85 Proceedinos. 1 985. 

— # 

Gosling. J.. "Oak Intermediate Bytecodes," 1995, 5 pages. 


Gozani et al., "GAFFES: The Design of a Gtobally Distributed File Sy^em." Report No. UCB/CSD 
87/361 ; Computer Science Division (EECS). U.C, Beridey (Jun. 1997). 


Page 14 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-1 8000 

Appln. No. 09/870.801 

Applicant Karl L. Ginter, et al. 

Filing Date June 01, 2001 

Group: 2132 


Examiner 
Initiar 

OTHER DOCUMEMT5 (including Autnor, i itie, uate, Kenineni rages, eic.| 


Greenwatd et al.. The Distributed Compartment Model for resource management and Access 
Control," Technical report Numl>er TR94-035, The Univer^ of Florida (Oct. 1 904). 

■ 

Griswold, Gary N., "A Method for Protecting Copyright on Networics", IMA Intellectual Property 
Proceedings, Vol. 1, Issue 1, January 1994. 


Gruber, R., et al.. "Disconnected Operation In the Thcw Objeqt-Oriented Database System," 
Laboratory of Computer Science. Massachusetts Institute of Technology, (undated), pp. 1-6. 



'—^ 

Guillou, txuis C; "Smart Cards and Conditional Access", Springer-Verlag. 1986.^ 


HalfhilL T.R., et al., "Agents on the Lx)0se." Byte.com. February 1994, pp. 1-2. 

— 0- 



HalfhIII, Tom, R., et al., "Just Like Magic?," Byle.cpm, February 12, 1994, pp. 1-5. 

_4l 

Haller, N., niie S/KEY One-Time Password System," Network Wortcing Group RFC 1760 (Feb. 
1995). 

Ofi .; . 

Hansen, S.E., et al., 'Automated System Monitoring and Notification with Swatch." Proceedings of 
the 1993 LISA. Monterey. Califomia. November 1-5, 1993, pp. 101-108. 


Hardjono. Thomas, "Record Encryption in Distributed Databases," Department of Computer Science, 
University of New South Wales, January 1990, pp. 386-395. 

-j^ 



Hardy, N., "The Keykos Architecture," Eighth Edition, December 1990, pp. 1-8. 


Ham, Lein, el al., A Software Authentication System for the rreveniion pT uompuier viruses, mum, 
1992, pp. 447-.450 

— p. 

—M. 

Harris, J., et al., •Bento Specification," Apple Computer, Inc.. July 15, 1993, 1C^ pages. 

--4. 

Harty, eiai,, uase ouKiyz i ne viom iransocuon rTv>w?ooiiiy oyoic^iii, ma/ i^oo, pp. > t**. 


Hauser, Ratf, "Ck)ntrol lnfonmatk)n Distribution arwl Access," Dissertatkm Der 

iAf:«*«.^KQffouneeAncr4iaftlir^hon Paki ithkl r^AT 1 intVOrftitAt 7llrich MdV 31 1995 
VVtrfSCriaHSVWSSCnSUnallllCncn ~anUluil viIllTWoiiioifcUiH^ii. ivtaj wff, 

^ 

Hauser. Ralf, C, "Does Licensing Require New Access Ck)ntrol Techniques?," Institut fur Infomnatik. 
Universitat Zurich, August 12. 1993. 9 pages. 

— # 

Hauser, Ralf, et al.. "LTTP Portection - A Pragmatic Approach to Liceoseing", Institut fur Informatik, 
Universitat Zurich, Jan. 13, 1994. 

—4^ 

Hawk, H.S., -RSA & General Magic," emaH to Good Guys. January 6, 1994, l .page. 

—4^. 



Heilman, "Multi-user Cryptographrc Techniques". 

so . 

Herzberg, Amir, et al., "On Software Protection", Proceedings of the 4*^ Jerusalem Conference on 
Information Technology (JCIT). lEE Computer Society Proes. April 1984. 


H-^prKorg Amir p\ ^\ •Ptihiir Protfirtion of gaftwtfa^G^ ACM Transactions on Com^^ 
5, No. 4. November 1987. 


Hickman, Kipp, E.B., SSL 2.0 Protocol Spectficatoln. 


Page 15 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

1 Appln. No. 

09/870,801 

Applicant 

Karl L. Ginter, et at. 



Filing Date 

June 01, 2001 

1 Group: 

2132 


Examiner 
Initiat* 

OTHER DOCUMENTS (Including Author, Title, Date, PerUnent Pages, etc.) 


uHi \Aiiiiiam oi "Priit Wf>»r and Read Wear * Computer Graohtcs and Interactive Media Research 
Group, ACM; May 3-7^ 1992. 


uiii \A/iiiiam At »i '*HL<%tAiv-rnnched DIartal Obiects." Computer Graphics and Interactive Media 
Research Group; Bell Communications Research, 1993. 


LA^tt^^ws. 1 1 KkfsAckrrx ikAatKnHe frtr r^mniitpr 5spmritv and Piivacv. Prentice-Hall. Inc.. 1977. 

-/ — 


—0- 

Li^i^k^.. o LjA<!»«n* hiiAftoi OI p o n Pmnrammlnn tnc% Books WoddvraJe. Inc. 1994. 



Lj««^.«^^n D **ninAet rtf tho Pirct 1 iM^PNix WndcshoD on Electronic Commerce (EC 95)." July 
1995. 

— # 

Hnn?ter. P.. Communications and Mulfimedia Securilv II. Chapman & Hall, 1996. 



LJninn r\ ai r^nmnittor QAoiirttv A/^aripmk^ Ptfiss Inc.. 1979; 
n^iao, u., el ai., Lrompuigr occunty. A^»#aui?ii»R* riooo, nn*., i*?* 



w.rtt A P 14 al Comnuter Securitv Handbook Second Edition. Macmfllan Pulriishing Company. 

4ru>o rin 901-917 
1 iwO, pp. ^ 1-^ 1 / . 

-f 

0 

Jaeger T, et al., "Support for the File System Security Requirements of Computational E-Mail 
Systerns,- Novemt)er 1994. ACM 0-89791-732-4/94/001 1 . 9 pages. 

r 

Johnson. H.L. et al., "A Secure Distributed Capability Based System,' ACM. 1985, pp. 392-402. 


Johnson, R., 'Info on Teiescript." 1994 Software Agents List Archieve. December 6, 1994, pp. 1-4. 



Jones et al., 'Credentials for Privacy and Interoperatton." University of Illinois at Urbana-Champaign. 

_^ 

Kahn, D.. The CodeDreaKers. i ne oiorv oi oecrei wnnna, i iw m^suiiuiioii v^vm^iij. . 

— ^ 



Kahn, Robert, et al.. "A Framevwjrk Distgributed Di^l Object Services. Corporation for National 

Researcn iniuauves, wiay lo, 


Kaliski, Jr., et al. 'A Layman's Guide to a Subset of ASN.1, BER. and DER", RSA Laborato4ries 
Technical Note» 1991, Revised November 1, 1993. 

^^L- 

Kamens. J J., "Retrofitting Network Security to Third-Party Applications-The SecureBase 
Experience," Symposium Proceedings, Unix Security IV, October 4-6, 1993, Santa Oara, California, 
pp. 41-57. 

— 

Kpp^r nprn fit fli , Tftstinq Computer Software. Second Edition; Van Nostrand Reinhold, 1988. 

—f- — 
—t^ — 

Kaplan, M., 'IBM Cryptotopes, Super Disln'bution and Digital Rights Management,' viewed at < 
<httD://www.research.ibm conri/DeoDleftc/kaolantervDtolope-docs/c^ December 30. 1996. 

pp. 1-10. 


Karger. PA. et al., 'A VMM Security Kernel for the VAX Architecture,' CK2884-5/90/0000/0002, 
IEEE 1990, pp. 2-19. 

-f^- — 

Karger, PA, et al., "Multtcs Security Evaluation: Vulnerability Analysis * HQ Electronic Systems 
Division, Hanscom AFB, Technical Report 19, June 1974. 14 pages. 


Page 16 of 38 


0MB No. 0651-0011. 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451.0001-18000 

Appln.f4o. 09/870.801 

Applicant Karl L GInter, et al. 

Fifing Date June 01. 2001 

Group: 2132 


Exanniner 
tnitiar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc) 

— 

Kastenholz. F.. The Definitions of l\itanaged Objects for the Security Protocols of the Point-to-Point 
Protocol." Networit Working Group RFC 1472 (Jun. 1993). 

— ^ 

uiom/ ir /Vimnittor HAfn QATiintv Litton Educatk^nal PublishinQ ConiDanv. 1973. 


Kautz, 'Referral Web; Connbining Social Networks and Collaborative Filtering." Conwnunications of 
the ACM, pp. oo-oo [Mar. lyy/ ) 

— # — - 

Keefe, T.F., et al., "Prototyping the SODA Security Model." Department of Computer Science. 
University Oi iviinnesoia, lyyu, pp. zn-^oo. 

— 

Kelman, Alistair, •Electronic Copyright Management: Possibilities and Problems". Scientists for Labor 
Presentation, Nov, i4. lyyo. 

— - 

Kelter, U.. "Discretionary Access Controls in a High-Performance Object Management System." 1991 
ItcE Gompuier oociety oymposium on r^esearun in ocvuiny aiiu i^i ivauy. may £.vr-&«^ i . 
Oakland. Califomla. pp. 288-299. 

— 

u'eiif Ar II «kt al *Tvnp 1 avaI Ancf^fifi Controls for Distributed Structurally Object-Oriented Database 
Systems." Computer Security, ESCORICS 92. SeccMTd European Symposium on Research in 
Computer Security. Toulouse. France, November 23-25. 1 992. pp. 21 -40. 

— -T- 

-4^. 

Kent, S., "U.S. Department of Defense Security Optfons for the Internet Protocol." Networi( Working 
Group RFC 1 108 (Nov. 1 991 ). 


Kent. 5., Pnvacy tnnancemeni lor iniemei ciewrunic iviaii. ran u. uin^aic-wao^u iwy 
Management." Networit Worthing Group, RFC 1422, 2002, pp. 1-29. 

— _ 

LrA«#<4^rvAi cfo%#o p of fil *^hnrhninn m<v1pK* A Plpxible Architecture for lnformatk>n Commerce", 
Stanford University. 

—pL 



iTim M tfkt At Thfk npQinn and Imolementation of Triowire: A File System Integrity Checker," 
November 19. 1993. 


Kim, Gene H.. et al. "Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection," 
Purdue Technfcal Report CSD-TR-94-012. Feb. 21, 1994. 



Kim, L.. et al.. "Nov^l Cuisine," Proceedings of the ACM SIGUCCS User Servfces Conference XIX, 
November 3^. 1991. Seattle. Washington, pp. 183-184. 


Kim, W.. et al., "Features of the ORION Object-Oriented Database System." 1989. pp.. 251-282. 

0L 

wm et al Object-Oriented Concents. Databases, and Aoolications. ACM Press, 1989. 

- 

_^ 

Klemond, P., "Investigating Object Linking and Embedding. Part II: Adding Server Support,* Mterosoft 
SystOTS Journal, May/June 1992. pp. 87-94. 



Klemond, P., "Taking the Bull by the Horns: Investigating Object Linking and Embeddhg. Part 1," 
Microsoft Systems Journal, March/April 1992, pp. 19-38. 


Wuepfel. H.M.. "Securing a Gtobal Village and its Resources: Baseline Security for Interconnected 
Signaling System #7 Telecommunk:atiohs Networics." 1 993, pp. 195-212. 


Page 17 of 38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION . 


Atty. Docket No. 07451 .0001-1 8000 

Appln.No. 09/870,801 

Applicant Karl L Ginler, et al. 

Filing Date June 01. 2001 

Group: 2132 


Examiner 
Initlar 

ATHl^R DOCUMENTS /Includina Author Title. Date. Pertinent Pages, etc.) 


Koenlg. A., "Autonnatic Software Distribution," Usenix Association Software Tools Users Group, 
Summer Conference, Salt Lake City, June 12-15. 1984. pp. 312-322. 


Kohl et al., •Safeguarding Digital Library Contents and Users," IBM research Division, D-Lib 
magazine. (Sep. 1997). 



Kohl, J. et al., 'The Kerberos Network Authentication Service (V 5)," Network Working Group 
Request for Comments RFC-1510. Septemb«- 1993, 104 pages. 

-r-. — 

— ^ 

Kohl. J.T., et a!., "The Evolution of the Kerberos Authentication Service," Digitat Equipment 
Corporation, (undated), pp. 1-15. 


Kohl. J.T.. et al.. The Evolution of the Kerberos Authentication System." 1991. 

—f- 

/ - 

Kohnfelder, Loren M., "Towards a Practical Public-Key Cryptosystem". May 1978. 


K^nheim, Alan, G., et al-Crvotoaraonv: A Primer^ Jonn wiiey a oons. inc., lyoi. 

—P- 

Konstan, el a!., "Applying Collaborative Filtering to Usenet News," Communications of the ACM, pp. 
77-87 (Mar. lyy/) 



/ 

KraiewsKi, Jr., M., Applicability or omari oaros to Netwonc user Auinenocauon, oompuung 
Systems, vol. 7, no. 1 , Winter 1 994, pp. 75-89. 

//] 

iTraiou/cki ir M "Smart Card Auamentation of Kerberos " The Mitre Corporation, (urtdated), 6 
pages. 


Krajewski. Jr., M.. et al., "Concept for a Smart Card Kerberos," The Mitre Corporation, (undated). 7 
pages. 

■■ 

Kramer, M.. "Strength in Numbers," PC Week. July 22, 1986, pp. 57-68. 



Kretitzer. A.N., "An On-Une System for Controlling and Monitoring Software Usage in a 

MlCrOCOmpuier l^uoraiury, oiowowo riewoKsuci, vwi. lo, iiw- yy^ ^v^^ 


Kristol, D.M., et al.. "Anonymous Internet Mercentile Protocol," AT&T Bell Laboratories. March 17, 
1994, pp. 1-16. . 

j^a£ 

KraL E.. The Whole Internet User's Guide and Cataloa. 2^. Ed.. 0* Reilty & Associates, Inc., 1992. 





Kurak, C, et al.. "A Cautbnary Note On Image Downgrading." Proceedings of the 1992 Computer 
Security Applications Conference. San Antonio, TX. December 1992, 7 pages. 

—0L 

Lacy, Jack, et ai.. "Music on the Internet and the Intellectual Property Protection Problem". 



Lagoze et al.. "A Design for Inter-Operable Secure Object Stores (ISOS)," (JonneH University, NCSA. 
CNRI (Nov. 1995). 


Lagoze, Cart, "A Secure Repository Design for Digital Libraries", D-Ub Magazine. Dec. 1995. 


I al onde Wilf. R.. et al.. Inside Smalltalk: Volume 1. Prentice-Hall, Inc., 1990. 

' ^ Lampson, B., *Ck)mputer Security,' Digital Equipment Corporation. 1991, pp. 1-54. 


Page 18 of 38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451 DOOM 8000 

Appln. No. 

09/870,801 

Applicant 

Karl L Ginter, et al. 



Filing Date 

June 01,2001 

Group: 

2132 


Examiner 

Intfbkt* 

ifiiiiai 

OTHER DOCUMENTS (Induding Author, Title, Date, Pertinent Pages, etc.) 

# — 

Lampson, B.W., "A Note on the Confinement Problem," Communications of the ACM, October, 1973, 

pp. 1-0. 


Lampson, BuUer, et al.. "Authentication in Distributed Systems: Theory and Practice", Digital 
cQUiprrieni wiflpwJciuuii, i99£* 


1 -i^tsAx^eMT P aI "A Tflynnrtmu nf rvimniit^ Prooram Securitv Flaws." ACM ComDUter Surveys. 
Vol. 26, No. 3, September 1994, pp. 211-254. 

— 

Landwehr. C.E.. Tormal Models for Computer Security," Computer Sur/eys. Vol. 13, No. 3. 
September 1981, pp. 247-278. 



Langelaar, G.C. "Overview of Protection Methods in Existing TV and Storage Devices," SMS-TUD- 
609-1 , Final Ver. 1 ,2, Feb. 26, 1996. 

— w- 

Leary. P., "Are There Ciphers in Shakespeare?," 1995, pp. 1-18. 


1 Aiec P *nn AiithnriTatinn Svstems iwith tarantor-ContTolled ProDaoatlon ori Privfleoes." Compcon 
83. February 28-March 3, 1 983, San Francisco, California, pp. 499-502. 


Lfkck M 'Dioftal Libraries Meet Electronk: Commerce: Orv^reen Intellectual Property," (Dec. 15, 
1998). 

— W- 

— 

Levine, P.H., et al., -Networit Ucense Server," Apolto, October 1987, pp. 1-19. 

^ 

Levy, Steven; 'E-Money (That's What 1 Want)", Wired Magazine, Issue 2,12, Dec. &4. 

A/) 

Lewontin, S.. et al., "The DOE Web Project: Providing Authorization and Other Distributed Services 
to the WcMid Wkie Web," February 22, 2002. 



A/1 

Un, P., "The Encapsulated Security Servfces Interface (ESSI)." Computer Security (Ar37), 1993, pp. 
119-135. 

— # 

Unn, J.. "Privacy Enhancement for Internet Bectronic Mail: Part l-Message Endphennent and 
Authentteation Procedures." Networic Worthing Group, August 1989. pp. 1-30. 


Lipson, S.. "LitUe Black Box 'Stocks' lOkat Software Copying," Slamford Advociate, September 14, 
1986,pp.E1-E2. 


l_nnkhart, Jr.. H.W., OSF DCE GuWe to Devetooina Distributed Applications. McGraw-Hill. Inc.. 1994. 

— <f ■ 
— - 

Lord et al.. "Access. Management in Multi-Administration Networiis," lEE 2^ Intematkmal Conference 
on Secure Commuhicatton Systems (1986). 

^ 

Low. S.H., et al.. "Anonymous Credit Cards," Proceedings of the 2"^ ACM Conference on Ck>mputers 
and Communication Security. Fairfax, Virginia, Novemb©- 2-4, 1994, pp. 1-10. 


Low, S.H., et al.. "Document Marking and Wentfffksatfon Using Both Line and VVord Shifling,"-AT&T 
Bell Laboratories tnfocom 95, Jul. 29, 1994. 


Lunt, Teresa, "Multilevel Security for Object-Oriented Database Systems," SRI Intematfonal 
Computer Science Laboratory, 1990, pp. 199-209. 


Page 19 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-1 8000 

Appln. No. 09/670.801 

Applicant Kail L Ginter. et al. 

Filing Date June 01, 2001 

Group: 2132 


Examiner 
Inltlar 

OTHER DOCUMENTS (Including Author, TItiB, Date, Pertinent Pages, etc) 


Mann, C.C., "Hom^and Insecurrty." September 2002. 

# 

— ^ 

Mathy, Laurent. "Features of the ACCOPI Multimedia Transport Service", Lecture Notes in Computer 
Science, NO. 1 045, Proc. of European Workshop IDMS' 96, March 1 996. 

-4^ 

Maude, T., et a!.. "Hardware Protection Against Software Piracy/ Communications of the ACM, vol. 
27, no. 9, Septemt)er 1984, pp. 951-959. 

— # — 

Maxemchuk, N.F., "Electronk: Document Distribution', AT&T Bell Laboratories 

— 

McClogbrie et aL. "Management Information Base for Networi< Management of TCP/IP-based 
Internets," Networi< Wortting Group, RFC 1 1 56 (May 1990). 


McCloghrie, K., k al., "Definitions erf Managed Objects for Administration of SNMP Parties." Network 
Woricing Group, July 1992, pp. 1-17. 



— 

McCollum, C.J.. et al., "Beyond the Pate of MAC and DACrDefining New Forms of Access Control," , 
Unisys Defense Systenis. 1990, pp. 190-200. 



Mr^raw, G., et al., Java Securitv. John Wiley & Sons. Inc.. 1997. 


Medvinsky, G., et al., "NetCash: A Design for Practical Electronk: CunBncy on the Internet," 1** 
Conference on Computer arKi Communk:atk)n Security, November. 1993. pp. 102-106. 


Merkle, R.C., "Secure Communications Over Insecure Channels." Communteations of the ACM, vol. 
21, no. 4. Apnl 1978, pp. 294-296. 



-i^ 

Merkle, Ralph C. Protocols for PuDltc Key oryptosystems , icnc, li^ou. 



Mftyer C.H.. et aL. CrvDtoaraohv: A New Dinienston in Comouter Data Securitv. John Wilev & Sons. 
Inc., i98Z. 

• 

Mnien. J.K., et al.. "Security for Object-Oriented Database Systems," Proceedings of the 1992 lEREE 

wOmpUier CwCieiy oymposium on r\tR>tf€lidl in oc^rUilly aiiu mvouy. ivioy "f*v, 199^, vaiMonu, 

Cafifomia, pp. 260-272. 

—4^ 

Miller, S.P:, et al., "Kerit)eros Authentkatk)n and Authorizatfon System." Massachusetts Institute of 
Technotogy, October 27, 1998, pp.1-36. 



Minear, S.E.. "Providing Policy Control Over Object Operattons In a Mach Based System," Secure 
ComputBTg Corporatton, April 28, 1995, 15 pages. 


Moens, Jan. "Case of Applicatfon of the Generic CITED Model to the CITEDIsation of a Directory 
Database on CD-ROM, Ver. 2.0," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 30, 1992. 



Moens. Jan, "Report on the Users Requirements, Ver. 1.0." ESPIRIT II, Project 5469, The CITED 
Consortium, Nov. 27, 1 991 . 


Moffett, J. D.. "Delegation of Authority Iteing Domain-Based Access Rules," thesis Imperial CoHege 
of Science, Technobgy & Medidrie, University of London (Jul. 1990). 

-M. 

Moffett, J., et al., "Spiecifying Discretk)nary Access Control Policy for Distributed Systems," Computer 
Communicatbns. vol. 13, no. 9, November. 1990, pp. 1-17. 


Page^of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATiON 


Atty. Docket No. 07451 .0001 -1 8000 

Appln. No. 09/870.801 

Applicant Karl L Ginter. et al. 

Filing Date June 01, 2001 

Group: 2132 


cxarnificr 

Initial* 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc) 


Mnff Att 1 n *5^nprification of Manaoement Policies and Discretiortarv Access Coritrol.* Deoartment 
Of Computer Sclefice, University of York, June 28, 1 994. pp. 1-28. 

^fi 

Moffett. J.D.. et a!.. The Representation of Policies as System Objects." Proceedings of the 
Conference on Organizational Computer Systems (COCS 91). Atlanta, Georgia, November 5-8, 
1991, 16 pages. 

^ ■ ; 

0L _ 

Moffett. J.D..et al.. "Policy Hierarchies for Distnbuted Systems Management," IEEE JSAC Spedal 
Issue on Network, Management, vol. 11 , no. 9, December 1993, pp. 1-4. 


Moffett, Jonathan, D., et al.. "An Introduction to Security Distributed Systems," Department of 
Computer Sdence, University of York, England, August 1993, pp. 1-14. 

— 

Montini. G, et al., 'Access Control Models and Office Structures," Computer Security: A Glolwl 
Challenge, 1984, pp. 473-485. . 

p- 



Mori, R. et al., Superdtstnbution: The Concept aruf the Architecture. THE TRANSACTONS OF 
THE EIEICE, V, E73. No. 7, Tokyo, Japan. July 1990, pp. 1133-1146. 


Muflic. Sead. Security Mechanisms for Comouter Networks. ERIs Horwood Limited. 1989. 

¥^ 

Mullender. S.. Distributed Svstems. ACM Press. 1989. 

^ 

Needham. R.M., "Ading Capability Access to Conventional File Servers.* Xerox Pak) Alto Research 
Center, (undated), pp. 3-4. 


Neuman et al. "Kerijeros: An Authentfcatiori Service for Computer Networics," IEEE Communicathns 
magazine (Sep. 1994). 

— ■ 

—St 

Neuman, B.C., "Proxy^Based Authorization and Accounting for Distributed Systems," Infonmation 
Sciences Institute, University of Southm Califomia, 1993, pp. ^33-291 . 

—p- — - 

Nguyen, Thanh et al., -Guidelines for Validation of a CITED System." CITED 5469, SA-21-40-003, 
Jul. 4, 1994. 


O'Connor, MaryAnn, "New Distribution Option for Bectronk: Publishers." Information Access Co,, 
March 1994, pp. 1-6. 

— ^ — 

Olivier, M.S. et al.. "A Taxonomy for Secure Object-oriented Databases," ACM Transactions on 
Database Systems, Vol. 19. No. 1 . March 1994, pp. 3-46. 

9iL 

Olivier. M.S. et al., "Building a Secure Database using Self-protecting Objects." Computers & 
Security, Vol. 1 1 , No. 3, 1992. 1 4 pages. 


Olivier. M.S. «t at., "DISCO: A Discretionary Security Model for Object-oriented Databases," in GG 
Gable and WJ Caelli, Eds., IT Security: The Need for International Copperatioa pp. 345-357. 
Elsevier Science Publishers B^V. (North Holland). 1992. 14 pages. 

^ 



Olivier. M.S. et al., "Secure Object-oriented Databases." Ph.D. Thesis. Rand Afrikaans University, 
Johannesburg, Decemt)er 1991 , pages i to xiv and 1-183. 

^ 

Olivier, M.S., "A Multilevel Secure Federated Database." Database Security, VIII (A-60), 1994. pp. 
183-198. 


Page 21 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

j Appln. No. 

09/870.801 

Apptcant 

Karl L. Ginter, et al. 



Filing Date 

June 01. 2001. 

1 Group: 

2132 


Fu 11.— ^tBtfir 

examiner 
Initial 

OTHER DOCUMENTS (Including Author. Title, Date, Pertinent Pages, eta) 


nicnn M et at •Concurrent Access Licensing," vol. 6, no. 9. Unix Review, 1988. pp. 67-74. 


nrfaii R ftt al The Essential Distributed Ot)iects Survival Guide. John Wiley & Sons. Inc.. 1996. 


nrganick. E.I.. The Multics Svstem: An Examinatton of Its Stmcture. MIT Press. 1972. 

—d — - 

a/] 

Paepcke, Andreas. "Summary of Stanford's Digital Library Testbed and Status." Stanford University, 
D-Lib Magazine (Jul. 1996). 

— 

. Paradinas, Pierre et al.. 'New Directions for Integrated Circuit Cards Operating Systems." 

#- 

Park J S AS/400 Securitv in a Client/Server Environment. John Wiley & Sons. Inc.. 1995. 

—fi 

Perlman. Bill. "A Working Anti-Taping System for Cable Pay-Per-View.' IEEE Trans. On Consumer 
Electronics. Vol. 35. No. 3 (Aug. 1989). 

^ 

Pethia et al.. •Guidelines for the Secure Operalton of the Internet," Network Working Group, RFC 
1281 (Nov. 1991). 



^ 

Picciotto, J., et al.. "Extended Labeling Policies for Enhanced Application Support." Computers & 
Security, vol. 13, no. 7. 1994, pp. 587-599. 


PiPtrftck M.. Windows Internals: The Imolementa^on of the Windows Ooeartion Environment. 
Addison-Wesley (1 993). 

^ 

Pijenborg. Marl, F.J.. "Auteursrecht En De Digilale Bibliotheek." 195 Open, Jan. 1995. 

^ 

Pijnenborg, Man F.J., "CITED Final Report." Ebeyier Science B.V.. Apr. 1994. 

— # 

Polk T W., Approximating Olarx-wiison Access inpies wiui dcj^o. ownuww, ^.^jrinpwwui 
Prtxiedings, Unix Security IV, October 4-6. 1993, Santa Clara. California, pp. 145-154. 

_jpL 

Popek, GeraW, J.. ^ al., "Encryption and Secure Computer Networks," Computing Surveys, vol. 11, 
no. 4. December 1979, pp. 331-356. 

— ^ 

Press. J., "Secure Transfer of Identity and Privilege Attributes In an Open Systems Environment." 
Computers & Security, vol. 10, no. 2, 1991. pp. 117-127. 


Press, Jim et al, "A New Appnwch to Crytographic Facility Design". ICL Mid-Range Systems Division 
Reading, Berks, UK. 


Purdy, G.B-. et al., "A Software Pnalectfon Scheme." Proceedings of the 1982 Symposium oh 
Security and Privacy, April 26-28, 1982, Oakland CaRfornia, pp. 99-103. 


Rfl<:hid R.F . CMU Comouter Science: A 25* Annlversarv Commemorative. Addison-Westey 
Publishing Company. 1991 . 

^ . 

Reali. Patti. "Copy Proteclton: The answer to pay per vfeWs Prayers?." TVRO Dealer, Dec. 1994. 


Reiher et al. "Truffles - Secure FBe Sharing With minimal system Administrator Interventton," UCLA, 
Trusted Informatkwi Systerns. 

—M 

Reiher et al.. "Trufnes - A Secure Serwce for WWespread File Sharing," UCLA. Trusted Information 
Systems 


Page 22 of 38 


INFORMATION DISCLOSURE CITATION 


0MB No. 0651-0011 


Atty. Docket No. 07451.0001-18000 

Appln. No. 09/870,801 

Applicant Karl L. Ginter, et al. 

Filing Date June 01. 2001 

Group: 2132 


Examiner 
Inltlar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc) 



Rescorla. E.. et al.. The Secure HyperTexl Transfer Protocol,' Enterprise Integration Technologies. 
June 1994, pp. 1-23. 


Richardson. D.W.. Electronic Monev: Evolution of an Electronic Funds-Transfer Svstem. The MIT 
Press (1970). 

—r 

Rindfrey J., **Security in the World Wide Web," Fraunhofer Institute for Computer Graphics (Dec. 
1996). 

^ 

Rindfrey, Jochen, "Towards an Equitable Systiefn for Access Control and Copyright Protection in 
Broadcast Image Services; The Equicrypt Approach," Fraunhofer Instftute for Computer Graphics. 

^2 

Rivest, R., The MD5 Message-Digest Algorithm," Network Working Group. April 1992. pp. 1-21. 

—d — 

Rivest. R.L., et al., "A Method for Graining Digital Signatures and Public-Key Cryptosystems." 
Communications of the ACM, vol. 21 , no. 2, February, 1978. pp. 120-126b. 

— ^ 

Rivest, Ronald L. et al., 'SDSI - A Simple Distributed Security Infrastructure", MIT and Microsoft 
Corporatbn, April 30, 1996. 


Roberts. R:. et al.. Comoutel's Computer Security. Comoute! Publicatk>ns. Inc.. 1989. 



Robinson et aL. 'Encoding Header FiekJ for Internet Messages," Networic Working Group RPC 1 154 
(Apr. 1990). 



Rose et al, "Structure and Identificatkm of management Informatbn for TCP/IP-based Internets," 
Networic Woricing Group RFC 1155 (May 1990). 

— p 

Rosenberry, W., et aL, "Dfetributing Applications Across DCE and Windows NT," 1 993. 

— r- 

--f 

Rosenberry. W., et al.. Understandinq DCE. O'Reilly & Associates. Inc.. 1 992. 

-/ 

Roseribtit, Moshe, Secure Software Distnbution , IEEE 0-7 o03-io1l-o/94, 1994. 



Rosenthal, uoug, ciNet a secure, open Network tor electronic commerce , iccc, i994. 


Ross, P.C., (Jops versus roDoers in cyoerspace, roroes \oep. a, layo;. 

-y 

Rouaiz. F., "A Web Navigator with Applets in CamI," INRIA. 

— - 

Rubin et aL, "FomDal Methods for he Analysts of Authentication Protocols CITI Technical Report 93- 
7," Center for Information Technotogy Integration (Nov. 8, 1993). 

— ^ 

Rubin et a!., "Long Runnirtg Jobs in an Authenticated Environment," CITI Technical Report 93-1, 
Center for Information Technology lntegratk)n (March 1 993). 



Rubin. AD., "Trusted Distribution of Software Over the Internet." Beltoore, 1995, pp. 1-9. 

—4- 

Rucker. et al., "Personalized Navigation for the Web," Communicatbns of the ACM, pp. 73-75 (Mar. 
1997). 

^2 

Rushby, J.M., "Design and Verification of Secure Systems," ACM, 1981, pp. 12-21. 


Russell. D.. et aL. Corriouter Security Bask:s. 0' Reillv & Associates.. Inc.. 1991. 

Page23of38. 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atly. Docket No. 07451.0001-1 8000 

Appln. No. 09/870,801 

Applicant Karl L. Ginter, et al. 

Filing Dale June 01. 2001 

Group: 2132 


Examiner 
inttiar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 


Russell, S.. 'Paradigms for Verfflcatfon of Authorization at Source of Electronic Documents in an 
Integrated Environment,' Computers & Security, vol. 12, no. 6, 1993, pp. 642-649. 


Russell, S., "Planning for the EDI of Tomorrow Using Electronic Document Authorization," Computer 
Security (A-37), 1993, pp. 243-251. 


Sahuguet, A. "Piracy: the Dark Side of Electronic Commerce:. CIS-700/2" Univ, of Pennsyh/ania 
(May 5, 1998). 


Sammer et al., "New Tools for the Jntemet," Jeanneum Research. Graz University of Technology. 

-f 

Sandhu. R., et al.. "A Secure Kemelized Architecture for Multilevel Object-Oriented Databases." 
Proceedings of the IEEE Computer Secmty Foundations Workshop IV. June 1991 . Franconia, NH; 
pp. 139-152. 

/ . 

— H 

Sandhu, R.S., "The Typed Access Matrix Model," Proceedings of the IEEE Symposium on Security 
and Privacy, Oakland California, May 4-6, 1 992. pp. 1 22-1 36. 


Sandhu, R.S., et al., "Data and Database Security and Controls," Handbook of InformatkHi Security 
Management, Auert>ach Publishers, .1993. pp. 1-37. 

—f ■ 



Sandhu, Ravi, S., ^ al.. "Implementation Considerations for the Typed Access Matrix Model in a 
Distributed Environment" Proceedings of the 15"* NIST-SCSC Natfonal Computer Security 
Conference. Baltimore. Maryland, October 1992, pp. 221-235. 



Saydjari. O.S., et al., "LOCK Trek: Niavigating Unchartered Space," Natwnal Computer security 
Center. 1989, pp. 167-176. ... 

— 

SchaumuHer-Bichl, S., "IC-Cards in High^ecurity Applications." Voest-Alplne AG, (undated), pp. 
177-199. 

— 

Schill. A, et aL, "Mobility Aware Multimedia X. 400 e-mail: A Sample Applk:ation Based on a Support 
Platform for Distributed Mobile Computing." Dresden University of Technology, Faculty of Computer . 
Science, (undated), pp. 1-7. 


Schill, AB., et aL, "DC++: Distributed Ot)jecl-Oriented System Support on top of OSF DCE," 1993. 

9^ r- 

— 

Schill, A.B., et al.. "DCE-The OSF Distributed Computing Environment Client Server Model and 
Beyond," October 1993. 


Schneier. Bruce. Aoolied CrvDtoaraohv: Protocols. Aloorithms. and Source Code in C. John Wilev & 
Sons. Inc., 1994. 

^ — 

Schuize, Dr. J., "Case of Applkation of the Generic CITED Model to the CITEDisation in the Software 
Distribution Process," ESPIRIT It, Project, Jan. 12, 1993. 

-4- 

Schutzer, p., "A Need for a Conrunon Infrastructure: Digital Libraries and Electronic Commwe." 
Citibank, D-Lib Magazine (Apr. 1 996). 


Sebes, E.J., "Overview of the Architecture of Distributed Trusted Mach," (undated), pp. 1-10. 

/» 

Sebes, E.J., et al.. The Architecture of Triad: A Distributed, Real-Time, Trusted System," (undated), 
pp. 1-12. 


Page 24 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-1 8000 

Appln. No. 09/870.801 

Applicant Kari L. Ginter, et al. 

Filing Date June 01, 2001 

Group: 2132 


Examiner 
Inhiar 

OTHER DOCUMENTS (tncluciing Author, ittie, uaie, remneni rages, eicj 


3ebe5. et aL, The Triad System: The Design of a Distributed, Real-Time, Truisted System," 
(undated), pp. 1-12. 


Shaffer, S.L:. et al.. Network Security. Academic Press. Inc., 1994. 


Shear, Vteton 'Solutions for CD-ROM Pricing and Data Security Problems". 

— w- 

Shirtey, J., "GukJe to Writfr^ DCE Appltoattons," 1** Ed. 1992, 

/ . 

Shiney, J., et-ai., outoe to wnttng uut Appiicaitons,- z co, isfw. 

— 

Shneier, B., "Descriptbn of New Variable-Length Key, 64-bit block clph©- (Blowfish)." Fast Software 
Encryption. Cambridge Security Woritshop Proceedings (1994). 

/ 

/vt7 

Short, K.L. MicroDTOcessors and Proqrammed Lootc. Prentice-Hall. Inc., 1981. 

— w- 

Sibert, O. el al., "DigiBox: A Self-Protecting Container for Infonmation Commerce," Proceedings of 
the First USENIX Woricshop on Electronic Commerce. New Yoric, NY, July 1995, 13 pages. 


Sibert. O.. et aL, The Intel 80x86 Processor ArcWtecture: Pftfalls for Secure Systems," (undated). 12 
pages. 

— 

^ — 

QimThn At at **nioitai imaoes Protection Manaoement In a Broadcast Framework: 
OverviewH'ALISMAN Solutfon." Thomson-CSF. RTBF, ART3000, UCL 

— 

Sirbu et at., "NetBiH: An Internet Commerce System Optimized for Network DelWered Seryk:es," 
Carnegie Melton University. 



Smith, Mary Grace, et al., "A New Set of Rules for Information Commerce: Rights-ProtecUon 
Technotogies and Personalized-lnformation Commerce Will Affect All Knowledge Woricers", 
CommunfcattonsWeek. Nov. 6, 1995. 


Solomon. A.. PC Viruses: Detection. Ar>^tysis and Cure. Sorinaer-Vertaq. (undated). 

— Qfi- 



Sotomon. Daniel, J., 'Processing Multilevel Secure Objects." Proceedings of the 1981 Symposium on 
Securfty and Privacy, April 27-29, 1981 , Oaktend, Cafifomia, pp. 56-61 . 



SL Johns, M., "Draft Revised IP Security OpUon". Networtc Working Group, RFC, 1038. Jan. 1998. 

— 

Stnilings, W . Crvotoaraohv and Networtc Security: Prindoles and Practk». Prentk:e-Hall. Inc.. 1999. 



Stefik, M., "Letting Loose the Light Igniting Commerce in Electronic Publfcation," Internet Dreams: 
Archetypes, Myths, and Metaptors. Massachusetts Institute of Technology, 1996, pp. 219-53. 

— ^ 

Stepney et. al.. "Formal specifk:atk)n of an Access Control System," Soflware-Practfce and 
Experience, Vol. 17, No. 9 (1987). 


Strack, Hermann. "Extended Access Control in UNIX System V-ACLs and Context," Usenix 
Associatfon. Proceedings of the Unix Security II Woricshop, August 27-28; 1990, Portland, Oregon, 
pp. 87-101. 


Slrohm et al.. "ABYSS: Tokens," IBM Research Report Number RC 12402 (Dec. 18, 1986). 


Page 25 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451 .0001-18000 

1 Appln. No. 

09/870,801 

Applicant 

Karl L. Ginter, et aL 



Filing Date 

June 01, 2001 

1 Group: 

2132 


Examiner 
Initial* 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc) 


Stubbleblne, S.G., •Security Services for Multimedia Conferencing," Proceedings of the 16"* National 
Computer Security Conference, Baltimore, Maryland, September 20-23, 1993, pp. 1-5. 

— 

Swedlow, Tracy, "2000: Interactive Enhanced Television: A Historical and Critical Perspective," 
Interactive TV Today. 


Tanenbaum et al., *'Amoeba System," Communications of the ACM, vol. 33, No. 12 (Dec. 1990). 


Tanenbaum et af., Expenences wnn tne Amoeoa uisinDUiea uperaung oysiem, vnje umver^iiBn 
and Centrum voor Wiskunde en Infom^ttca. 


Tanenbaum et al., 'Using Sparse Capabilities in a Distributed Operating System," Vrije Universiteit 
arKl Centre for Mathematics and Computer Science. 

— 
— ■ 

Tanenbaum. A.S.. et al., "Distributed Operating Systems," Ccmiputing Surveys, vol. 17. no. 4, . 
December 1985, pp. 419-470. 

—fi 

Tanent)aum, A.S., et al., expenences wim ine AmoeDa uisuiDuieo vperaung oydieni, israu. 


Tanenbaum. AS., et al., "The Amoeba Distributed Operating System-A Status Report." 1991. 

IT ■ 

— # 

Tanenbaum, A.S., Modem Ooeratina Svstems. Prentice-Hall, Inc. 1992. 


Tflnftnhfltjm, A.S.. Ooeratina Systems: Desian and Implementation. Prentfce-HalL Inc. 1987. 



^ 

Tardo et aL. "Mobile Agent Security and Telescript," General Magic. Inc. 


Thomas, R.K., et al;, "Implementing the Message Filter Object-Oriented Security Model without 
Trusted Subjects." Proceedings of the IFIP Wortcshop on Database Security. August 19-21, 1992, 
Vancouver, Canada, 21 pages. 


Thompson, Vctoria P., et al., "A Concept for Certification of an Army MLS Management Infbnmation 
System", Proceedings of the 16*** Natfonal Computer Security Conference, September 20-23. 1993. 





Thor. 'A Distributed Object-Oriented Database System", MIT. 


TKi iroicinnham R pt sA 'PATf^lifil PTQcessinQ and Trusted Database Manaaement Systems," 
ACM,1993. 

— 9iL- 

Thuraisingham. M.B., "Mandatory Security in Object-Oriented Database Systems," OOPSLA *89 
Proceedings, October 1-6, 1989. pp. 203-210. 



Ting, T.C.. et al.. "Requirements. CapabiliUes and Functionalities of User Role Based Security for an 
Obj^-Oriented Design Model." Database Security, V: Status and Prospectus, 1992. pp. 275-297. 



Tirk^. AZ. et al., "Electronic Water Marie," (undated), 5 pages. 

^ - 

Toohey, J.. Usina OLE 2X in Aoolication Devetooment. Que Corporatwn, 1994 

—0. 

Townsend. J.E., 'NIST on Internet Security." March 22. 1994, pp. 1-15. 



Tuck, Bill, 'ElectiDnic Copyright Management Systems: Final Report of a Scoping Study for Efib," 
(Jul. .1996). . 


Page 26 of 38 . 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

1 Appln. No. 

09/870.801 

AppHcartt 

Karl L Ginter, et al. 



Filing Date 

June or 2001 

1 Group: 

2132 


Examiner 
Initiar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc) 

— " 

Tygar, J.D. et al., •Cryptography: It's Not Just for Eiectronic Mail Anymore." CMU-GS-93-107. School 
of Computer Science Carnegie Mellon University. Pittsburgh. PA, Mar. 1, 1993, 21 pages. 

^ A 

Tygar, J.D. et al„ 'Dyad: A System for Using Physically Secure Coprocessors." School of Computer 
Science, Carnegie Melton University. PIttstHjrgh, PA, May 1991. 43 pages. 


Tygar. J.D. et a!., 'Strongbox: A System for Self Securing Programs," CMU Computer Science: 25*** 
Anniversary Commemorative,. R. Rashid (ed.) Addison-Wesley, 1991 , pp. 163-197. 

f . - ' 

Uhler. Stephen A.. "PhoneStation. Moving the Telephone onto the Virtual Desktop." 1993 Winter 
ii^PKitx San Dieoo California Januarv 25-29. 1993, pp. 131-140. 

— # 

r^iiiiiutA c Tho 1 inHnriimAntPd PC' A Proorarrimer*s Guide to I/O. Cous. and Fixed Memory. 
Areas. Addison-Wesley Publishing Company. 1994. 



van Schyndel. R.G., et al., "A Digital Watemnark." (undated), 3 pages. 

—4— 

Van Slype. Georges et al. "The Future of CITED; a Feasibility Study." ESPIRfT II, Project 5469. The 
CITED Consortium. Nov. 1 5, 1 993. 


Van Stvpe. Georges et al., "Natural language Version of the Generic CITED Model. Ver. 4.2, Vol. 1: 
Presentation of the Generic Model," ESPIRIT II. Project 5469, The CITED Consortium. May 8. 1995. 

-# — 

—QH 

Van Slype, Georges et al.. "The Future of CITED: A Feasibility Study. Ver. 1 .0, Vol. II: Full Report," 
ESPIRIT ri. Project 5469, The CITED Consortium; Feb. 28. 1994. 


Van Slype, Georges, "Draft CITED Interchange Formats, Ver. 1 .0". ESPIRIT II, Project 5469. the 
CITED Consortium. Jan. 28. 1994. 

— 

Van Slype, Georges, "Knowledge Economy; Future Trends," CITED 5469. 

■ . if'' 

Van Slype. Georges. "Natural Language Version of the Generic aTED Model, Ver. 2.1 , Vol. II ECMS 
(Electric Copyright Management ^tem) Des^n for Computer Based Applications." ESPIRIT II, 
Project 5469, The CITED Consortium, May o. i99o. 

—p — - 

Van Slype, Georges, "Natural Language Version of the generic CITED model Vol. 1: Presentation of 
the generic model, ver. 3.0". and "Vol. II: CItedf usage monitoring system design for computer based 
applications, ver. 1.0" Project 54659, The CITED Consortium, September 6. 1993. 

— - 
— 

Van Slype, Georges. "PL4 RACE/ACCOPI Wortcshpp on Conditional Access and Copyright 
Protection," ESPIRIT II. Project 5469. Presentation of the CITED, Nov. 9. 1994. 

S- 

Van Slype, Georges, '•PL4 RACE/ACCOPI Workshop on Conditional Access and Copyright 
Prolectbn." ESPIRIT II, Project 5469. The CITED Consortium, Nov. 9. 1994. 

/ 

Varr Slype. Georges. "The CITED Approach. Ver, 4.0," ESPIRIT.II, Project 5469,.The CITED 
Consortium. Apr. 20. 1994. 

f — 

Van Slype, Georges. "The Future of CITED: A Feasibility Study. Ver. 1.0. Vol. 1: Summary Report 
and and Recommendatfons." ESPIRIT II, Project 5469. The CITED Consortium. Feb. 28, 1994. 


Van SIvpe, Georges, "The Future of CITED: A Feasibilrty Study. Ver. 1.1 . Vol. Ill: Draft CITED 
Interchange Fonnats." ESPIRIT II. Project 5469! The CITED Consortium. Feb. 28, 1994. 


Page 27 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Alty. Docket No. 07451 .0001-18000 

Appln. No. 09/870,801 

Applicant Karl L. Ginla-, et al. 

Filing Date June 01. 2001 

Group: 2132 


Examiner 
Inltiar 

OTHER DOCUMENTS (Including Author, Title. Date. Pertinent Pages, etc) 

-# — 

Van Slype. Georges. "The Future of CITED: A Feasibility Study. Ver. 1.1. Vol. 1: Summary Report 
and Recommendations." ESPIRIT II. Project 5469, The CITED Consortium. Mar. 28. 1994. 


Vickers Benzel, T.C.. et al.. "Identificalion of Subjects and Objecis in a Trusted Extensible Client 
Server Architecture," (undated), pp. 1-17. 

r — 

Vittal. J.. "Active Message Processing: Messages as Messengers." Bolt. Beranek and Newman, Inc., 
1980, pp. 175-1 95, 


VoydocK, V.L., el ai., oecuniy Mecnanisms in nign-uevei neiwuii\ riuuAA^o, ouinpuuiiy outvpyo, 
vol. 15, no. 2, June 1983, pp, 135-171. 

— 

Wagner, N. ringerpnniing, urexei universiiy, iccc oymp. imu. aiiu riivouy I'^c* i^^of. 



WfliicGT Bruce. J., et al.. Comouter Securitv and Protection Structures. Dowden. Hutchinson. & Ross. 
Inc., 1977. 


Walker, S.. "Notes from RSA Data Security Conference," January 18, 1994. pp. 1-3. 



Ware. W., Chairman RAND Corporation "Panel: The InterTrust Commerce Architecture," 1997, 6 
pages. 


Wayner, P., •Agents Away," Byte.com, May 1994, pp. 1-9. 


Wayner. Peter Diqital Coovrioht Protection, Academic Press, 1997. 

^-^ 

Weadon, P.O.. "The SIGSALY Story," Decemt)er 10, 2002. 

^ 

0i 

Wel)er, Robert; "Digital Rights Management Technologies - A Report to the International Federation 
of Reproduction Rights Organisations". Northeast Consulting Resources, Inc., Oct. 1995. 

_4l 

yNdber, Robert; "Metering Technologies for Digital Intellectual Property - A Report to the International 
Federation of Reproduction Rights Organisations", International Federation of Reproduction on 
Rights Organisations, Northeast Consulting Resources. Inc., Oct 1994. 


Weingart. S.H., "Physical Security for the uABYSS System", IEEE, 1987. 

Fr- - 

-M 

Wftlls Rob, Odvssev of Plastic Purchase: 20-Second Round Trio. Associated Press. Dec. 1993. 

f 

While, J.E., Telescript Technology: An IntroducUon to the Language," General Magic, Inc., 
(undated), pp. 1-13. 

_2L 

White. James E„ "Telescript: The Foundation for the Electronic Marketplace", Ver. 5.0, General 
Magic. Inc., November 30. 1993. 

-0. 

White, Steve R.; Comerford, Uam; "ABYSS: A Trusted Architecture for Software Protection:, IEEE, 
Apr. 27. 1987. 

. / : . 

White, Steve R.; Comerford, Uam; "ABYSS: An Architecture for Sofhflfeare Protection". IEEE 
Transations on Software Engine^ing, Vol. 16, No. 6. Jun. 19M 

on 

Willetl. S., 'Metered PCs: Is Your System Watching You?, Wave Systems Beta Tests New 
Technology;" IDG Communications, Inc., May 2. 1994. pp. 1-6. 

Page ^of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


A!ty. Docket No. 

07451.0001-18000 

Appln. No. 

09/870,801 

Applicant 

Karl L Glnter, et al. 



Filing Date 

June 01,2001 

Group: 

2132 


Examiner 

Inillat* 

OTHER DOCUMENTS (Including Author. Title, Date. Pertinent Pages, eta) 

_^ 1 

Williams, S., *'An MSJ Interview with Microsoft's Chief Architect of OLE, Tony Williams," Microsoft 
Systems Journal, October 1993, pp. 55-66. 

— / 

uuiiitarrvci Tnnu "MicfDsofl Obiect Strateov" Microsoft PowerPoint Presentation", 1990. 

—¥■ — - 

Winslet et aL, "Formal Query Languages for Secure Relational Databases,' ACM Transactions on 
HaiahaQp ^v^tpiTft^ Vol 19 No 4 fDec. 1994). 

— €- 

Wobber, Edward, et al„ "Authentication in the Taos Operating System", Digital Equipment 
iXjrporauon, utsiAsfttud lu, 


Wong, R.. et aL, The SIDOS System: A Secure Distributed Operating System Prototype." Odyssey 

OAfAoiv-h Accrir*i9toc rkrfnhpr 1QfiQ rm 172-183 
Kesearun msouwcjico, wuiuuci i ^o^, • r ^ ■ ww. 



Thnmac Y p ^ aI *a Pramfiwork for Distributed Authorization.'* Proceedtnqs of the 1 ^ 
Conference Computer and Communication Security, November 1993, pp.112-118. 

V 

— 

xKfrsnei p u At al UNIX Svstem Security Pioline Associates. Inc.. 1985. 

— ^ 

Yee. B., "Using Secure Coprocessors." CMU-CS-94-149, School of Computer Science, Canvegie 
Mplton Universftv Pittsburoh. PA. 1994, 94 paoes. 

—Vl- 

Yee, B., ^ al., "Secure Coprocessors in Electronic Commerce Applications," Proceedings of the First 
Usenix Workshop on Electomic Commerce. New York, New Yoric. July 1995, 16 pages. 

A A 

—4^ 

Young, W.D.. "Verifiable Computer Security and Hardware: Issues," Technical Report, Computational 
Logic Inc., September 1991. 43 pages. 


Zeleznick. MP., "Security Design in Distributed Computing Applications." Department of Computer 
Science. University of Utah, December 199i3. 16 pages. 

— 9fi 

Zelnick, Nate, "Keeping Business Safe on the Internet," PC Magazine. April 25, 1995, pp, 1-2. 

— 9fi 

Zurko, M.E,. "Panels at the 1997 IEEE Symposium on Security and Privacy." Oakland, CA, May 
1997, 12 pages. 


"A Brief History of the Green Project," viewed on March 12, 2002 at 
<htlp://iava.sun,com/people/jag/green/index.html> pp. 1-2. 

—f — - 

A2b's Recent Press Coverage. (1998). 

(if 

"Access Control and Copyright Protection for Images Security Technotogy for Graphics and 
CommuTttcatton Systems - RACE Ml 005: ACCOPI", webpage, Security Projects atfraunhofer 1GD. 
2002 



"ACCOPI RACE Project Ml 005 Wamirq of ACCOPI web pages removal," UCL Laboratoire de 
telecommunications et teledetectton. 

^ 

•Achievements Archive," wwwjmprimatur.ne*/ web pao^^^ 

V 

•American National Standard: Spedffcation for Rhancial Message Exchange Between Card Acceptor 
and Acquirer, X9.1 5," American Banker's Associatton, 1990. 


Page 29 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451,0001-18000 

1 Appln. No. 

09/870.801 

Applicant 

Karl L. Ginter. et al. 



Filing Date 

June 01. 2001 

1 Group: 

2132 


Examiner 

Initial* 

OTHER DOCUMENTS (including Author, Title. Date. Pertinent Pages, etc) 

9^ 

"An Introduction to Safety and Security in Teteserlpt.' (undated), 8 pages. 

V 

"AT&T PersonaLinIc," Before Fet)niary 13, 1995. 


"AT&T Smart Card Systems & Solutions." AT&T (1993). 

-4— 

Automatiori of Securities l^arttets and Regulatory Implications, Financial Market Trends. No. 50, pp. 
20-33, Oct 1991. [File 148. Gate Group Trade & Industry DB; Dialog(R) commercial database]. 


Bell-L^t)s Secure Technologies. "Information Vending Encryption Syste.-n (IVES)™." Lucent 
Technologies, May 31 ; 2002. pp. 1-16. 



Byte.com, 'Speaking the Same Language,' May 1994, pp. 1-2. 



CardTecWSecurTech 94 Conference Proceedings, "BuiWing Foundations for Innovatkin," 
CardTecWSecurTech. Inc.. April 1994. 1,031 pages. 

— # 

u 

— # — 

Carnegie Melten University. "Internet Billing Server." Prototype Scope Document, INI Tech Report. 
Octotier 14, 1993. pp. 1-29. 

— . 

Central Point Anti-Virus, Central Point Software. 1993. 

■ f ■ 

CITED: Final Report A Guide to CITED Documentation, tSrlKi i , hrojeci o4oy, iooim u-/ iz*- 
2115-2. The CITED Consortium. Sept. 1994. 


CUED: CopynQnt in Transmitted electronic uocumenis, opeciai inieresi oroup. ui i ^aj mcoiiy. 
Heathrow. Sep. 22. 1993. 



^iT^pr\.- t^M^mmfiAn rvf IKa I^ITCn hhr\r\eA Pi inr^lrknal Peni lirpmpnt^ 5^nf^ficationS* ^SCUSSlon PaOOr 

CITcD: rTeparation or uie l*ii mxj ivioueti runcuoiKii rvtAiuiiciiiciiio wj/cviirx»ik/iw, \ • u^^i 
(Revision 1)," Bureau Van Dijk. Jan. 16, 1991. 



CITED: Preparation <rf the CITED Model Functional Requirements Specifications; Reports of the 
Interviews vwth Five CITED Partners." (Partriers: Sagem. Telesystemes. NTE, Elsevier, Oxford 
University Press). Bureau Van Dyik, Apr. 5. 1991. 

— # 

Collection of Documents Including: Protecting Electronically PuDlisneo Froperties, increasing 
Puljifehing Profits. (Electronic Publishing Resource Inc.) Jan. 1993, 25 pages. 


Competitive Analysis AT&T/a2b music (Jun. 16, 1998). 

1^ 

-Copyright Ownership Projection in Computer-Assisted Training", COPICAT - 8195, ESPRIT, Dec. 
1993. 

— / 



COPYSMART - 20517: 'CITED Based Multi-media IPR Management on Cost Effective Smart 
Device." European Inforamtion Technology for Information Science, start date Dec 1. 1995. 


•CopySmart (CSM) suit." European Information technology for tnformaton Science. 



"CREANET - Creative Rights European Agency NETworK - Project Profite." Information Society 
Technologies (Feb. 18, 2000). 


'Cryptographic API Specification," Version 0.6. Mkrosofl. Mar. 1995. 



Xryptolope Ck)ntainers Technology: A White Paper', IBM InfoMarkel Business Development Group. 


Page 30 (^38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

Appln. No. 

09/870,801 

Applicant ' 

Karl L Ginter. et al. 



Filing Date 

June 01, 2001 

Group: 

2132 


Examiner 
Initial* 

■ OTHER DOCUMENTS Ondudlng Author. Title, Date, Pertinent Pages, etc.) 


CUPID. "Protocols and Services: An Architectural Overviev/", IP Workshop, Ver. 1, Last updated 
November 20. 1997. 

; i^H 

Data NetvKork and Open System Communicatjons, Directory: Information Technology - Open 
Systems Interconnection - The Directoiy: Overview of Concepts, Models, and Services." ITU-T 
Recofpniendaiion A.ouu, iniernauonai leiecwmrrajiiit-ouuii uinun v'^^v. i^^^^. 



mr\r^^ T^^^9%^t*^^t of lAinrir ** nietriKi itckH rvtmniitinn PnviiTinfTifint httD*/Awww oDenQTOUD.orQ/techydoe/ 
tech/tech.htni, Noveml)er 7, 2000, pp. 1-3. _ ...... 

(f- 

•Deliverable D3: Spedficalion of the Infrastructure and Explanation of trust and Confidence Building 
Sotutions." Ver. 0. 1 , Telenet (Jul. 1 8, 2000). 



Deoartment of Defense Computer Security Center, "Department of Defense Password Management 
Guideline," Department of Defense Computer Security Center, Apnl 1 2. 1985, pp. 1-34. 


Department of Defense Standard, "Department of Defense Trusted Computer System Evaluation 
Criteria," December 1985, pp. 1-72. 



Department of Defense, Trusted Computer System Evaluation ontena, uecemoer iwo, i ^ pages. 

— f 

"D^ital Broadband Delivery System, Phase 1.0, System overview, Kevision i.u, ociennnc Moarna. 
1997. 



Digital Rights Enforcement ana Managemeni. ouperuisuiDuiion oi *-riyjjiuiufrt» , lowi. 

--^ 

an 

DOD "Rainl)OW Series. 


Dynamic linking of SunOS 



-4- 

EFFector Online, Vol, 6, No. 6, "A Publication of the Electronic Frontjer Foundation,' 8 pages, Dec. 6. 
1993. 


•EFT Network Data Book; 1993 Edition,* Bank Networtc News, Vol. 11, No. 13. Nov. 1992. 

^ — 

■Electronfc Reverse Copyright Management System (ERCOMS),' Internatkjnal Institute for Electronfc 
Ubrary Research, website updated by Rannsden, Anne (Jul. 22, 1996). 

— §k 

E-mail from Caglar Gunyakti entitled: "Private Test Needed." April 28, 2001, 1 page. 

^-JO. 

EmaO from Chris Drost-Hansen re press release: "AT&T Launches A2B Music Trial for Delivering 
Songs Over the Internet," Business Wire (Nov. 3. 1997). 


Email from Edmond Kouka to JearvFrancois Boisson re TELENET TELEtraining platform - Bogdan 
Lutkiewicz, Poland, Gdansk (Mar. 4, 2001 ). 


ESPIRIT Project 20676 - IMPRIMATUR - Intellectual Multimedia Property Rights Model and 
Terminotogy for Universal Reference." IMPRIMATUR Consortium (Oct. 1998). 



(0 

ESPIRIT Project 5469: Contract Amendment Number 2; Commission of the European Communities, 
Sep. 16, 1993. 


Page 31 of 38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-18000 

Appln. No. 09/870.801 

Applicant Karl L. Ginter, et a!. 

Filing Date June 01 , 2001 

Group: 2132 


CXalTiiiivi 

Initiar 

OTHER DOCUMENTS (Inctuding Author, Title, Date, Pertinent Pages, etc.) 


ESPRIT Project 22226 - MUSE - Devebptng StarKJardlzed Digital media Management. SignaGng and 
encryption Systems for the European Music Sector " International Federation of the Phonographic 
Industry (Oct 1998). 


ESPRIT Project 24378 - MENHIR European Multimedia Network of Hig^h Quality Image Registrationr 
Museums On Line (Feb. 1. 1997). 

— # — — 

"Europe and The Glottal Information Society Recommendations to the European Council/ 
Bamgemann Report, www.medkaf.ora web oaoes. Global Information Society (May 1994). 

-P- 

"Forum on Risks to the Public in Computers and Related Systems," The Risks Digest, Vol. 15; Issue 
39. January 21, 1994. pp. 1-12 



•Forum on Technotogy-Based Intellectual Property Management - Electronic Commerce for Content*, 
IMA INtellectual Property Proceedings, Vol. 2, Jun6 1996. 



FreeBSD System Manager's Manual "LDCONFIG", Oct 3. 1993. 


"Gemplus. MCOS: Mufti Applk^tion Chip Operating System - Introduction " Gemplus Card 
lntematk)nal(1990). 



Global Projects Group, "Smart Card Technology Intemattor^l: The Global Journal of Advanced Card 
Technology," undated, pp. 1-1 51 . 


Guide to the Secure Conf^uratkm and Administration of Mk^rosoft Exchange 5.x®'" National Security 
Agency. June 20, 2002. pp. 1-58. 

— 

Handwritten note re: GVS and AJL. Mar. 2. 1 994. 

-i^ 

Hewl^ Packard Co.. 'Manager's Guide to MPE/iX Security;" Hewlett-Packard Company, April 1994. 

-/ 

IBM,' "Key Cryptotope Components," viewed on March 13, 2002 at 
<http://vvww-3.ibm.conri/software/security/cryptolope.abo^^ 



IBM;IBM Cryptolope Technology^Executive Sunrvnary." viewed on March 1 3, 2002 at 
<http://www-3.ibm.conri/soflware/security/cryptok)pe.about.html> pp. 1-3. 


IBM, "OpenDoc vs. OLE 2.0: Superior by Design " IBM, January 1994, pp. 1-4. 

— — 

-Imprimatur News," IMPRIMATUR (Dec. 1998). 

M 

Information Systems Audit and Control Association-Montreal Chapter, 'Authentification dans les 
environnements de traitement distributes," viewed on March 25, 2002 at <http:www.apvcsi- 
montreal.ca/en/pubricatu)ns/contact133;html> pp. 1-15. 

— 

Interchange Message Speciffcatwn for Debit and Credit Card Message Exchange Among Rnandal 
Institutions " American National Standard, Accredited Standards Commrttee X9-Financial Servfces 
Committee, ANSI X9.2-1988, American Bankers Association, May 16, 1988. 


Intemattonal Infrastructure Standards Panel, "lISP Need #31 -Containers or Secure Packaging," 
Electrons Publishing Research, Septem!>er 18, 1995, pp. 1-3. 


Page 32 of 38 


0MB No. 0651-0011 

informahon disclosure citation 


Atty. Docket No. 07451 .0001-18000 

Appln. tk>. 09/870,801 

Applicant Karl L Ginter, et al. 

Filing Date June 01 » 2001 

Group: 2132 


Examiner 
tnitiar 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc) 


International Infrastructure Standards Panel, "lISP Need #32-Authentication of Coritent," Electronic 
Publishing Research, September 18, 1995, pp. 1-3. 

/ 

International Infrastmcture Standards Panel, *IISP Need #33-ContiDl Enforcentent," Electronic 
Publishing Research, September 18, 1995, pp. 1-3. 

if 

International Infrastructure Standards Panel, 'lISP Need #34-Bniing and Payment," Hectronic 
Publishing Research, September 18, 1995. pp: 1-3. 

^ 

Intematlons; Infrastructure Standards Panel. "lISP Need #35-Reportirig.* eectronic Publishing 


intAmatinnat ^^tanriarrl •Rank Card Oriainated Messaoes - Interchande Messaoe 
Specifications - Content for Rnancial Transactions," International Organization for Standardization, 
August 15. 1987, pp. 1-33. 

— # 

Introduction to Smart Cards v. 1 XT, Gemplus Card Intematioal, March 21 , 1991 . 



tOpener," Registered Trademark of National Semiconductor Corporation, Registration date Octot>er 
4, 1994. 1 page. 



IS0 1 1568-1 and -2. "Key Management (retail) - Part 1: Introduction to Key Management; Part II: Key 
Management Techniques for Symmetric Ciphers." ISO (Dec. 1 , 1994). 



— (fi. 

IS0 13491-1: "Secure Cryptographic Devices (retail) - Part 1: Concepts, Requirements and 
Evaluation Methods." ISO (Jun. 15. 1998) 



ISO 7498/1 : Open Systems Interconnection: Security Architecture (1 988). 

— # 

ISO 7498/2: Open Systems Interconnection: Security Architecture (1988). 


ISO 781 3-1 987 Identification Cards-Financial Transaction Cards." ISO, 1 987. 



./On - 

ISO 8583-2: Tinandal Transaction Card Originated Messages - Interchange Message Specifications 
- Part 2: Application artd registration Procedures for institution loenuricanon uooes (iiu;, ibu (jui. i, 
1998). 

IP- T- 

ISO 8683-3: Tinancial Transaction Card Originated Messages - Interchange Message Specifications 
. Part 3: Maintenance Procedures for Codes." ISO (Jul. 1 , 1 998). 

^ 

ISO 9564-1 & -2: "Personal Identiflcatlon Numt)er (PIN) management and security - Part 1: Basic 
Principles and Requirements for online PIN Handling in ATM and POS Systems; & -2 Approved 
Al9orithm(s) for PIN Endphemienl." ISO (Apr. 15, 2002 & Dec. 15. t991). 


ISO 9807: "Banking and related Financial Services - Requirements for Message Authenticatbn 
(retail)," ISO (Dec. 15, 1991). 

— 

JUKEBOX - Music Across Borders." LIB.JUKEBOX/4-104?. 

s 

"Key Management Using ANSI X9.17." Federal Information Processing Standards Publteation 171, 
U.S. Department of Commerce (Apr. 1 992). 


-KeyKOS Principles of Operation," Key Logk: document KL002-O4, 1985, Fourth Edition (Jan. 1987). 


Pdge33of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451 .0001-18000 

Appln. No. 09/870,801 

Applicant Karl L Ginter, et al. 

Filing Date June 01. 2001 

Group: 2132 


Examiner 
Initial* 

OTHER DOCUMENTS (Including Author, Tttle, Date, Pertinent Pages, etc) 


Letter re: ESPIRIT Ill-Project 5469 (CITED) from A. Stajano at Commission of the European 
Communities, Oct. 7. 1993. 

—gl — - 

Lorcan Dempsey & Stuart L Weit>el; The Warwick Metadata Workshop; A Framework for the 
Deployment of Resource Description, Jul7Aug. 96. 


"Mor^i nonk^ ** \/ipwpd -nn Fdbriiarv 6 2002 at 

httD:/AAAAAw2.cs.cmu.edu/afs/cs/Droiect/mach/Dublk:AAww/^ dd. 1-3. 

— - 



Microsoft Press, OLE 2 Programmer's Reference; Volume 1, 'Working vwth Windows Objects,* 1994. 


Miscellaneous letter from Georges Van Slype at Bureau Van Dyik, Feb. 28, 1 994. 

f ^ — 
—4- — — 

Miscellaneous Letters from Georges Van Slype at Bureau Van DIjk, Mar. 30, 1995. 

— 

Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Feb. 13, 1995 and Nov. 2. 1994. 

—gL _ 

Miscellaneous Letters from George Van Slype at Bureau Van Dijk. Sep. 12, 1994, May 11, 1994, 
May 10, 1994, May 6, 1994, May 4, 1994, Apr. 21, 1994, Apr. 20. 1994.. 


Miscellaneous Letters from Georges Van Slype at Bureau Van Dijk, Apr. i9, 1994, Apr. lo, law, 
Apr. 11. 1994, Apr. 6. 1994.. 


Miscellaneous Letters from Georges van oiype at bureau van uijk, Mar. au, iyy*i, wiar, ^a, lysw-, 
Feb. 10.1994. 



— 

Miscellaneous Leners from oeorges van oiype ax Dureau van uijk, reo. a, i^jw, *i<an. ^/ , jom. 
19, 1994, Jan. 12. 1994, Dec. 22. 1993, Nov. 30, 1993, Nov. 22. 1993, Dec. 6, 1993. Nov. 16, 1993. 
OcL 15, 1993, Oct 7, 1993, Oct 4, 1993, Sep. 20. 1993, Sep, 7. 1993, May 19, 1993, Oct 19, 1993. 


Motorola MC68030 Enhanced 32-bit Mteroorocessor User's Manual. 2^ Ed.. Prenttt»-Hall, 1989; 


•MSDN-INF: LAN Manager 2,1 Server Autotuntng (Part2)." PSS ID No, 080078. Microsoft (Feb. 
1993). 

—4 

"MSDN-Ucence Servtee Application Programming Interface," API Specifk:ation v1.02. Micorsofl (Jan. 
1993). 

— 04 

Multtes, Horne; viewed on Novemb^ 12, 2001 at 
<http://www!multrcians.org> pp. 1-3. 

—m^ — 

"Multimedia Mixed Object Envetopes Supporting a Graduated Fee Scheme via Encryption"; IBM 
Technical Disctosure Bulletin, Vol. 37, No. 3, Mar. 1 994. 

—4^ 

"Multimedia System Servfces Ver. 1 .0", Hewlett-POackard. IBM. & SunSoft. 1993. 


National Computer Security Center, Trusted Unix Working Group (TRUSIX) Rationale for Selecting 
Access Control List Features for the UNIX (R) System," August 18. 1989. 


Page 34 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 

07451.0001-18000 

j Appln. No. 

09/870.801 

Applicant 

Karl L Ginter, et al. 



Filing Date 

June 01.2001 

1 Group: 

2132 


Examiner 
Initial* 

OTHER DOCUIVIEhrrS (Including Author, TWe, Date, Pertinent Pages, etc) 


National Institute of Standards and Technology. "History of Computer Security: Early Computer 
Security papers, ran i , viewBu on oepit?iTiuci ^uv^ ai 
<http:/ycsfC.nlst.gov/publications/historyAndex.html> pp. 1-27 

- 

National Security Agency, A ouioe to unaersianaing oecuniy ivioaeiing in i rut»uju oy^itfind, 
Octot)er 1992, 122 pages. 

—S — -- 

National Semiconductor IPower Technology, (unoaiea), n pages. 


Netscape, "SSL 2.0 Protocol Specification.'' viewed at 
http'7/home.netscaDe.com/ena/securitv/SSL-2ntmi January ^uuo. 


NIST & NSA, "Federal Criteria for Information Technology Security," Vol. II. Version 1.0, National 
Institute of Standards and Technology and National oecunty Agency. uecemDer 1:^9^, u po^t^. 

— # 

NSA JCorean War 1950-1953 Commemoration," History Papers. Natiwial Security Agency. 
http://www.nsa.aov/korea/DaDersJifrn, pp. 1-2. 

-# 

OLE 2.0 Draft Content: Ot^ject Unking & emt)edding", Microsoft. June 5, 1991. 

A/] 

OMG Security Working Group, "OMG White Paper on Security.'* OMG Security Wortcing Group, April 
1994, pp. 1-24. 

V 

■ 

OOPSLA 1993: Addendum to the Proceedings. "Security for Object-Oriented Systems." Septeml)er 
26-Octol)er 1 . 1 993, pp. 77-78. 


r^pon cinftwarp Fniinriation. OSF DCE Administratfon Guide-Core Comoonents. PTR Prenttee HaD. 
1993. 



-Pavment Svstems: Strateoic Choices for the Future." HitatcW Research Institute; Institute of 
Advanced Business Systems, Hitachi, Ltd., 1993. 

—gi — 

PKCS #1:RSA Encryption Standard," RSA Laboratories Technk:al Note. Ver. 1.5, revised Nov. 1. 
1993. 

— - 

o\cc^ A'^' niiffi«kj-|p|tman Kev-Aareement Standard " RSA Laboratories Technk^al Note, Ver. 1.4. 
revised Nov. 1,1993. 

— fi — 

PKCS #5: Password-Based Encryption Standard," An RSA Laboratories Technical Note. Ver. 1.5, 
1991-1993, Revised Nov. 1, 1993. 


PKCS #6: Extended-CertiiRcate Syntax Standard," RSA Laboratories Technical Note, Ver. 1.5, 
revised Nov. 1,1993. 

— 

PKCS #8: Private-Key Irrformatfon Syntax Standard,' An RSA Laboratories Technical Note. Ver. 1 .2, 
1991-1993, Revised Nov. 1, 1993. 

— — 
— 

PKCS #9: Selected Attribute Types," RSA Laboratories Technical Note, Ver. 1 .1 , revised Nov. 1, 
1993. 

— 

PKCS #10: Certificatk)n Request Syntax Stanard." /Vn RSA Laboratories Technical Note, Ver. 1.0, 
Nov. 1,1993. 


Page 35 of 38 


0MB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty Docket No. 07451. DOOM 8000 | Appln. No. 09/870.861 

Applicant Karl L Ginler. et al. 

Filing Date June 01, 2001 | Group: 2132 

Examiner 
Initial* 

OTHER DOCUMENTS (Including Author. Title, Date, Pertinent Pages, etc.) 


PKCS #1 1 : Cryptographic Token Interface Standard". An RSA Laboratories Technical Note. Ver. 2.0. 
Apr. 15. 1997. 

—s— 

PKCS #12 V 1.0: Peraonal Infomiation Exchange Syntax". RSA Latwratories. Jun. 24. 1999. 

■ r . — - 

PKCS #13: Elliptic Curve Crytography Standard", RSA Security. Jan. 12. 1998 



PKCS #15 V 1.0: CryptOQraphic Token inTormauon rormai oianuaru , rvorv i_auwiaiwi«3o, npi. 
1999. 


PowerAgent Introduces First Internet Infomediar/ to tmpower ana rroieci v^uii&unicid \ i owi i cm 
Aug. 4, 1997) 

— # 

PowerAgent Introduces First Internet infomeaiarY lO tmpower ana nuieui v^uiioumc^o 
(Techmall.com Aug 4, 1997). 

f 

¥ 

"Privacy and the Nil: Safeguarding Telecommunicaiions - weiaiea rersonui uni hmuuh , w.*^ ^^ay^ 
of Commerce, Oct. 1995. 


— , kji..if:»«i^io cwefom ormirAct" M&c 2 0 Interactive Multimedia Association 

Reauestfor Technology: Muitimeaia oysiem services , ver. ^.u, uiiciowuv^ mwiu« 

Compatit)ility Project, Nov. 9, 1992. 



^* T^>ln/^trk<lu• MiiitimoHifi ^x/ctPfTi fieTvlces" Draft. Ver. 1 .1 . Interactive Multimedia 
ReQuest for lecnnoiogy. iwuiiiniBuio oyoicni odviu-^^ , k^iai^, 

Association Compatibility Prqect, October 16, 1992. 

— 

-D««..j«ir«*»rrfc fnr th*fc <Viftw9rp Licefise Mandoement Svstem". System Management Work Group, 
Rev. 3, Unix Intemattonal, July 23, 1992. 

__^2 

DC A CAr^iiritv nawq* "FnterDTise Solutions Announces RSA Mail,* 
<tittp://rsasecurfty.conn/news/pr/940112-2.html.>, dated January 12. 1994.-pp.1-2. 

— T- 

RSA Security; News; "General Magic Picks RSA." <4ittp:/yirsasecurity.coinAievw/pr/940.112-3.html.>. 
dated January 12. 1994, pp. 1-2. 

— ¥■ 

RSA Security. News; "Hewlett-Packard Chooses RSA." <htlp7frsasecurity.com/news/pr/940112- 
5.htnil.>. dated January 12, 1994, pp. 1-2. 

1^. 

"RSA Seciffity; News; "Hilgraeve Ships Secure Version of HyperACCESS/5.° 
<http7/reasecurity.com/news/pr/940112-8.html.>, dated January 12. 1994. pp. 1-2. 



RSA Security; News; "iPower's Data Security Approach." <http7/rsasecurity.con[i/news/pr/94D112- 
10.htnil.>. dated January 12. 1994. 

— .jaL- 

• (H) ' 

RSA Security; News; "RSA Enters Wireless Arena." <http7/rsasecurity.conr»/news/pr/940112-6.html.>. 
dated January 12. 1994. pp. 1-Z 


RSA Security: News; <http7/rsa5ecurity.com/news/pr/9401.html.>. dated January 12. 1994. pp. 1-2. 

—il 

•S/PAY: RSAs Developer's Suite for Secure Electronic transactions (SET)," RSA Data Secunty. Inc. 
(1997). 

■ / .. ■ 

Secure Computing. "Constructing a High Assurance Mail Guard." 1994, pp. 1-10. 


Page 36 of 38 


OMB No. 0651-0011 

INFORMATION DISCLOSURE CITATION 


Atty. Docket No. 07451.0001-18000 | Appln. No. 09«70.801 

Applicant Karl L. Ginter, et al. 

Filing Date June 01. 2001 | Group: 2132 

Examiner 
InKiar 

OTHER DOCUMENTS (Indudihg Author, Title, Date, Pertinent Pages, etc.) 

—0- 

Secure Electronic Transactions; Mastercard and Visa+ C345 

— 

•Security Enhanced LINUX," National Security Agency. httD://vww.nsa.qov/selinux/. pp. 1-2. 


■Security in KeyKOS." 

— — 

A 

choriHan Software Systems Data Widaets 2.0: Proarammer's Guide. Stieridan Software Systems. 
Inc., 1993-1995. 



A A 

•SIGSALY Secure DigitaLVofce Communications In Worid War 11," Nationni Security Agency, 
httpr/ywww nsa.aov/wwii/DaDers/sfasalv.htm. Optot)er 13, 2000, pp. 1-2. 

— # 

/i/J 

Smart Card 1993 Conference Proceedings. "Day 1: Communications and Marketing Systems & 
Maricet Overview," Lowndes Exhibition Organisers, Ltd., 1 993, pp. 1-79. 

/ 

•STARFiSH State of ttie Art Financial Services for the in Habitants of Isolated Areas - Project 
Profile." Information Society technologies, time schedule (Jan. 21 , 2000 - Jun. 30. 2002). 

— w— — 

Stuffll Delux V 1 .5. V 3.0, v. 3.5, Alladin Systems. 1988-1994. 

— / 

Summaries of Projects (FP Ill/TV) - Part 1: "ESPIRIT Project 20517 - COPYSMAFTT CITED based 
multi-media IPR management on cost effective smart device." European Information technotogy for 
Information Science (OcL 1998). 



Symantec Anti-Virus for Macintosh (a.k.a. SAM), Symantec, 1993. 



Symantec Corporation, THINK Pascal: The Fastest Way to Finished Software," Symantec 
Corporation. 1990. pp. 93-123. 

^ 



"TALISMAN - Tracing Authors' Rights by Labeling Image Services and Monitoring Access Network," 
ACTS PfOject No. AC019, Doc Reference ACD19-THO-RGS-FR-P OOl-ol (Sep. 25. 199S). 


TALISMAN: Tracrr^g Authors Rights by L^t>eling image 5>ervices ana Moniionng /access neiwon^, 
&rT^ c^AiLftfi PAiiicination in Eurooean Research Proorams (Sep. 1. 1995, Aug. 31, 1998). 



Technical Description: Pay-Per-View Copy Protection " Macroyision, Jun, 1994. 



Technical Rationale Behind CSC-STl>003^5: Computer Security Requirements," 
httpJ/www.radlum.ncsc.mil/lpep/library/rainbow/CSC-STC)-004-8^^ June 25, 1985, pp. 1-40. 

— 

Technical Strategies for Protecting Intellectual Property in the NetviK>rked Multimedia Environmenr, 
IMA Intellectual Property Proceedings. Vol. 1. Issue 1. January 1994, 


TELENET TELEtrairiing Platfonn (on NETwortcs) - Project Profile." InfomiaUon Society 
Technologies, time schedule (Mar. 6, 2000 - Mar. 30, 2000). 

—iO. 

Telescript Security," BYTE.com (Oct 1994). 


•The Armide Products", web page. 

—9^ 

— # 

The First USENIX WoricshoD on Electronic Commerce Proceedinos. New York. New York. July 1 1- 

12, 1995. Usenix Associatk>n. 


Page 37 of 38 


INFORMATION DISCLOSURE CITATION 


OMB No. 0651-0011 


Atty. Docket No. 07451.0001-18000 

Appln. No. 09/870.801 

Applicant Karl L GInter, et al. 

Filing Date June 01, 2001 

Group: 2132 


Examiner 
initiar 

OTHER DOCUMENTS (Including Author. TlUe, Date, Pertinent Pages, etc.) 

— - 

The Future of Cited: A Feasibility Study," ESPIRIT II. Project 5469. CITED Project Review. Apr. 15. 
1994. 


The PowerTV Wlute Paper", powertv.com website. Octot>er 1 1. 1996. 



The i^sks Digest. 'Forum on Risks to the Publk: in Computers and Related Systems," Vol. 15; Issue 
39. January 21 , 1 994, pp. 1 -12 

— r- 

"The Standard BusinessrTime for Change, " Eurq[>ean Commision'DGI1 1 Espirit Project ^ 
Consensus Forum (Nov. 3-4. 1998). 

^ 

1 nniK w. dDieci~*jn6nico » rocira 1 1 n i ni lu ivioiiuai. oyriianicLr ouiumaULifi, isoa. 



Tims-Life Books, Understandina ComDulers: Comouter Securitv. 1986. 


TULIP Final Report, ISBN 0444^2540-1. 1991, revise! September 18. 1996. 


U.S. Department of Commerce (MIST). •Security Requirements for Cryptograptilc Modules," January 
11. 1994. pp. 1-53. 

— 

U.S. Patent and Trademark Prosecution Hfetory for National SemkXMiductor Corporation "^iOpener* 
Trademark, Registration date Octot>er 4, 1994, 27 pages.TULIP Rnal Report. 

— ()a 

UniverCD: The InlerActive. Online Litwarvof Product Information From Cisco Svstems. Cisco 
Systems 1993. 


Unix Svstem v. Release 3.2. Proarammer's Guide. Vol. II. AT&T. Prentice Hall (1989). 

— ^ 

VirusCheck and VirusScan. McAfee, 1993 


Examiner 


Date Considered 


•Examiner Initial if reference considered, wtiether or not citation is in conformance with MPEP 609; draw line 
through citation if not in confonnance and not conskJered. Include copy of this form with next 
communk3tk)h to appUcant 


FonnPT01449 


Patent and Trademark Office - U.S. Department of Commerce 


Page 38 of 38 



OMBNo. 0651-0011 


INFORMATION DISCLOSURE CITATION 
(Use several sheets if necessary) 


Atty. Docket No.: 07451.0001-18000 


Application No.: 09/870,801 


Applicant: Karl L. Ginter, et al. 


Filing Date: June 1.2001 


Group: 2132 


U.S. PATENT DOCUMENTS 

Examiner Initial* 


Document 
Number 

Date 

Name 

Class 

Sub 
Class 

Filing Date. 
If Appropriate 




4.748.561 /J 

5/31/1988 

Brown 


JOD 


^ 


4.757.914 

7/19/1988 

Roth et al. 




— la 


5.517.518^ 

5/14/1996 

Morson et al. 




(}<; 


5,745.678 /) 

4/28/1998 

Herzberg et al. 

w 



0. 


5.819.263 

10/6/1998 

Bromley et al. 




(h 


5,842,173 ^ 

11/24/1998 

Strum etal. 

lor 




FOREIGN PATENT DOCUMENTS 

Examiner Initial* 


Document 
Number 

Date 

Country 

Class 

Sub 
Class 

Translation 
Yes or No 




AU-A-36815/97 

2/19/1998 

/Ujstralia 

aocp 



f — 


AU-A-36816/97 

2/19/1998 

Australia 




— 


AU-A-36840/97 

2/19/1998 

/Australia 

/^o^L 





EP 0913 757 A2 

5/6/1999 

EPO 


1(0^ 





WO 97/43761 ^2. 

11/20/1997 

PCT 

(-\{^ 



OP 


WO 97/48203 4/ 

12/18/1997 

POT 


I /no 


-J^ 


WO 98/09209 flj 

3/5/1998 

PCT 


11 Co 





WO 98/10381 ^ 

3/12/1998 

PCT 




—M. 


WO 98/37481 fi[ 

8/27/1998 

PCT 


(In 


—k. 


WO 98/45768 /? ( 

10/15/1998 

PCT 







WO 99/01815 /I/ 

1/20/1999 

PCT 

6^HF 




Examiner J uj-fih /:7arraiAi 


Date Considered: Of I x J /icQj^ 


•Examiner; Initial if reference considered, wtiether or not citation is in conformance with MPEP 609; draw line through 
citation if not in conformance and not considered. Include copy of this form with next communication to applicant. 


Fomn PTO 1449 


Patent and Trademark Office - U.S. Department of Commerce 


Page 1 of 4 


■ i, IW'** 1 ■ 



OMB No. 0651-0011 

VI/ 

INFORMATION DISCLOSURE CITATION 
(Use several sheets if necessary) 


Atty. Docket No.: 07451 .0001-18000 

Application No.: 09/870,801 

Applicant: Kaii L. Ginter, et al. 

Filing Date: June 1 . 2001 

Group: 2132 

"tutlVED 


FOREIGN PATENT DOCUMENTS TechnoIogy Center ?i 00 

Examiner Initial* 


Document 
Number 

Date 

Country 

Class 

Sub 
Class 

Translation 
Yes or No 



WO 99/24928 /f^. 

5/23/1999 

PCI 






WO 99/48296 fij 

9/23/1999 

POT 





OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 


Berkovitz, S. et a!., "Authentication of Mobile Agents," Mobile Agents and Security, Springer-Verlag, 
Giovanni Vigna. Ed., 1998, pp. 1 14-136. 


Champine, G., MIT Project Athena: A Model for Distributed Campus Computing, Digital Equipment 
Corporation, 1991, 22 introductory pages, Chapter 1 (pp. 3*18); Chapter 2 (pp. 19-33); Chapter 3, (pp. 
37-68); Chapter 4 (pp. 69-75); Chapter 5 (pp. 79-107); C 

— M 

Chase, Chevy, M.D.. "DiscStore", Electronic Publishing Resources, 1991 . 

— m 

Constructing a High Assurance Mail Guard, Secure Computing, 1994, pp. 1-10. 


Electronic Currency Requirements, XIWT (Cross Industry Wori<ing Group), (undated). 16 pages. 



Ellison, C. et a!., "SPKI Certificate Theory," Internet Engineering Task Force (IETF) RFC 2693. Sept. 
1999, 38 pages, available at http://www.ietf .org/rfc/rfc26939.b(t?number=2693 


Federal Criteria for Infonnation Technology Security," Vol. M, Version 1.0, National Institute of 
Standards and Technology and National Security Agency, December 1992, 270 pages. 

-4^ 

Financial Transaction Card Originated Messages - Interchange Message Specifications - Part 2; 
Application and registration Procedures for Institution Identification Codes (IIC), ISO 8583-2, Jul. 1 , 
1998. 

— #2 

Financial Transaction Card Originated Messages - Interchange Message Specifications - Part 3: 
Maintenance Procedures for Codes, ISO 8583-3, Jul. 1. 1998. 

4^ 

Hohl. F., Time Umited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Lecture 
Notes in Computer Science, Vol. 1419: Mobile Agents and Security, Springer-Veriag, 1998, G. Vigna 
Ed., pp. 90-111. 



Intemational Standard IS08583, "Bank Card Originated Messages - Interchange Message 
Specifications - Content for Financial Transactions," Intemational Organization for Standardization, 
August 15. 1987. pp. 1-33. 

/!/} 

Introduction to Smart Cards v. 1.0", Gemplus Card Intematioal, March 21, 1991. 


Examiner J^^^^ 7. Q^^^^^ 

Date Considered: q //^^ (y^^^ 

•Examiner: Initial if reference considered, whettier or not citation is In conformance with MPEP 609; draw line through 
atation if not in conformance and not considered. Include copy of this form with next communication to applicant. 

Form PTO 1449 

Patent and Trademark Office - U.S. Department of Commerce 


Page 2 of 4 


'/ ' ' \ ■ 



OMBNo. 0651-0011 


INFORMATION DISCLOSURE CITATION 
(Use several sheets if necessary) 


Atty. Docket No.: 07451.0001-18000 

Application No.: 09/870,801 

Applicant: Karl L. Ginter, et aL 



HhCEIVED 

Filing Date: June 1, 2001 

Group: 2132 

NOV 1 6 m 


lecnnoiogycentei 2tOQ — 

OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 


iOpener, Registered Trademark of National Semiconductor Corporation, Registration date October 4, 
1994, 1 page. 



—M 

Key Management (retail) - Part 1: Introduction to Key Management; Part II: Key Management 
Techniques for Symmetric Ciphers. ISO 1 1568-1 and -2. Dec. 1. 1994. 


KrajewskI, Jr.» M., "Applicability of Smart Cards to Network User Authentication," Computing Systems, 
vol. 7, no. 1, Winter 1994, pp. 75-89. 


Lehman, B., "Intellectual Property and the National Information Infrastructure, A Preliminary Draft of 
the Report of the Working Group on Intellectual Property Rights." July 1994, 4 introductory pages and 
pp. 1-141. 



Microsoft Authenticode Technology. Microsoft Corporation. Oct. 1996. 

^ 

Open Systems Interconnection: Security Architecture. ISO 7498/1, 1988. 

—Jl 

Open Systems Interconnection: Security Architecture, ISO 7498/2, 1988. 

/)/) 

— m- 

Personal Identification Number (PIN) management and security - Part 1: Basic Principles and 
Requirements for online PIN Handling in ATM and POS Systems; & -2 Approved Algorithm(s) for PIN 
FnciDherment ISO 9564-1 & -2 TAor 15 2009 & Dec 15 1Qd1 



PowerAgent Introduces First Intemet 'Infomediar/ to Empower and Protect Consumers, 
Techmall.com. Aug 4. 1997. 


Rozenblit, Moshe, "Secure Software Distribution", IEEE 0-7803-1811-0/94. 1994. 

— — 
— ^ 

Rubin, A.D., Trusted Distribution of Software Over the Internet," Bellcore, 1995. pp. 1-9. 



Sander, T. et at.. "Protecting Mobile Agents Against Malicious Hosts," Mobile Agents and Security: 
Lecture Notes in Computer Science. Springer-Vertag, G. Vigna, Ed., Vol. 1419, Nov. 11. 1997, 16 
pages. 

— ^ 

Sander, T. et al., "Towards Mobile Cryptography." IEEE Proceedings of Security and Privacy, May 
1998. 10 pages. 

^ 

Secure Cryptographic Devices (retail) - Part 1: Concepts, Requirements and Evaluation Methods, ISO 
13491-1,Jun. 15, 1998. 

0t 

Specification for Financial Message Exchange Between Card Acceptor and Acquirer, X9.15, 
American National Standard, American Banker's Association, 1990. 

— 

Tanenbaum, A.S., et al., "The Amoeba Distributed Operating System," 1990. 

^ 

Tanenbaum, A.S.. et al., "The Amoeba Distributed Operating System-A Status Report," 1991. 


The Risks Digest, "Forum on Risks to the Public in Computers and Related Systems," Vol. 15; Issue 
47, February 9, 1994, pp. 1-12. 


(/lAi 


Date Considered: Q(l-l\/lQ\it 


*Examiner: Initial if reference considered, whether or not citation is in confomnance with MPEP 609; draw line through 
citation if not in conformance and not considered. Include copy of this fomn with next communication to applicant. 


Form PTO 1449 


Patent and Trademark Office - U.S. Department of Commerce 


Page 3 of 4 



0MB No. 0651-0011 


INFORMATION DISCLOSURE CITATION 
(Use several sheets if necessary) 


Atty. Docket No.: 07451.0001-18000 


Application No.: 09/870,801 


Applicant: Kaii L. Ginter, et al. 


Filing Date: June 1, 2001 


Group: 2132 


OTHER DOCUMENTS (Including Author, Title, Date, Pertinent Pages, etc.) 


Transformer Rules Strategy for Software Distribution Mechanism-Support Products, IBM Technical 
Disclosure Bulletin. Vol. 37, No. 48, Apr. 1994, pp. 523-25. 


Examiner T T H 


Date Considered: (7// 2- J /i^q q f 


*Examiner: Initial if reference considered, whether or not citation is in confomnance with MPEP 609; draw line through 
citation if not in confomnance and not considered. Include copy of this fonm with next communication to applicant. 


Form PTC 1449 


Patent and Trademark Office - U.S. Department of Commerce 


Page 4 of 4